{"id":291,"date":"2025-11-24T02:44:31","date_gmt":"2025-11-24T02:44:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/?p=291"},"modified":"2025-11-24T02:44:31","modified_gmt":"2025-11-24T02:44:31","slug":"cia-triad-confidentiality-integrity-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/2025\/11\/24\/cia-triad-confidentiality-integrity-availability\/","title":{"rendered":"CIA Triad (confidentiality, Integrity, Availability)"},"content":{"rendered":"\n<p><strong>What is CIA?<\/strong><br>A model used for designing and evaluating security controls. Think of this as your<br>foundation in which everything else gets built off of. The Chai article describes the triad as a model<br>that guides organizational InfoSec policies.<br><strong>Confidentiality<\/strong><br>This is to prevent the unauthorized disclosure of data. Examples include role-based<br>permissions, file or folder permissions, encryption, or the principle of least privilege.<br><strong>Integrity<br><\/strong>To prevent unauthorized alteration. Ensure the data was sent how it was sent. My favorite<br>are cryptographic hashes, but others exist like digital signatures or input validation.<br><strong>Availability<\/strong><br>verifies authorized users have access to data or systems when needed. An example would<br>be DDOS mitigation and how the customer doesn\u2019t have to suffer from preventable things. NIST<br>defines availability as being accessible upon demand by an authorized entity.<br><strong>Authentication vs. Authorization<\/strong><br>I&#8217;m going to break this down in a very simple way because in the beginning it took me a<br>while to grasp. Authentication is who are you? And authorization is what are you allowed to do.<br>Authentication can be managed with biometrics, smartcards, tokens or even passwords while<br>authorization are you basic read, write, execute level accesses.<br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Sources<\/p>\n\n\n\n<ul>\n<li>Chai, Wesley. \u201cWhat is the CIA triad (confidentiality, integrity and availability)?\u201d<br>(TechTarget). Defines CIA and its use in org policy; also notes the AIC alias. TechTarget<br>\u2022 NIST (CSRC &amp; SP 800 series). Formal definitions of confidentiality, integrity,<br>availability; digital identity and authentication guidelines (SP 800-63).<\/li>\n<\/ul>\n\n\n\n<p> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is CIA?A model used for designing and evaluating security controls. Think of this as yourfoundation in which everything else gets built off of. The Chai article describes the triad as a modelthat guides organizational InfoSec policies.ConfidentialityThis is to prevent the unauthorized disclosure of data. Examples include role-basedpermissions, file or folder permissions, encryption, or the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/2025\/11\/24\/cia-triad-confidentiality-integrity-availability\/\">Read More<\/a><\/div>\n","protected":false},"author":31499,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/users\/31499"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}