{"id":282,"date":"2025-09-29T02:52:34","date_gmt":"2025-09-29T02:52:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/?p=282"},"modified":"2025-09-29T02:52:34","modified_gmt":"2025-09-29T02:52:34","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/2025\/09\/29\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>The CIA triad is the backbone of cybersecurity that provides the main framework for protecting confidential data. CIA stands for confidentiality, integrity, and availability. At the same time, authentication and authorization are the access control processes that maintain the hardware and technical infrastructure, as well as the systems that hold and display important information (Chai 2022).<br><\/p>\n\n\n\n<p><strong>Confidentiality, Integrity, Availability<\/strong><br>According to Wesley Chai, the CIA triad is a concept that is used to develop information security policy in businesses. Confidentiality is used to protect private data from unauthorized access attempts. Data is frequently grouped based on the amount of damage that could result from potential threats. Integrity ensures that important data is reliable and accurate throughout its lifecycle and is not tampered with by unauthorized users. Lastly, availability makes sure that authorized users have timely access to data and systems whenever needed.<br><\/p>\n\n\n\n<p><strong>Authentication and Authorization<\/strong><br> Authentication and authorization are different but very similar concepts of cybersecurity. Authentication is the process of confirming a user\u2019s identity in a certain system, proving you are who you say you are. This includes, but is not limited to, passwords, biometrics, tokens, etc (Fortinet 2025). Authorization occurs after authentication and determines what an authenticated user is allowed to do. It allows for which resources a user can access and what actions they can perform. For example, when logging into a bank app, entering your password verifies your identity with authentication, but viewing your own account balance is associated with authorization (Fortinet 2025).<br><\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>In conclusion, by guaranteeing that data is protected, accurate, and accessible to the correct authorized user, the CIA triad serves as the foundation of information security. Authentication and authorization are essential components that support this framework by verifying identities and regulating resource access. These components together enable safe and dependable system usage while preventing information from being misused. Establishing effective security procedures that protect people and businesses requires an understanding of how they operate and differentiate themselves.<br><br>Works Cited<br>Chai, W. (2022, June 28). What is the CIA triad? Definition, explanation, and <br>examples. TechTarget.<br>https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/<br>view<br>Fortinet. (2025). Authentication vs. authorization: What\u2019s the difference? Fortinet<br>https:\/\/www.fortinet.com\/resources\/cyberglossary\/authentication-vs-authori<br>zation?utm_source<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA triad is the backbone of cybersecurity that provides the main framework for protecting confidential data. CIA stands for confidentiality, integrity, and availability. At the same time, authentication and authorization are the access control processes that maintain the hardware and technical infrastructure, as well as the systems that hold and display important information (Chai&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dlsdemo06\/2025\/09\/29\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31367,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/users\/31367"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/posts\/282\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dlsdemo06\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}