{"id":274,"date":"2023-09-24T13:37:30","date_gmt":"2023-09-24T13:37:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dmaka001\/?p=274"},"modified":"2023-09-24T13:37:30","modified_gmt":"2023-09-24T13:37:30","slug":"the-fundamental-principals-of-cybersecurity-authentication-authorization-and-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dmaka001\/2023\/09\/24\/the-fundamental-principals-of-cybersecurity-authentication-authorization-and-the-cia-triad\/","title":{"rendered":"The Fundamental Principals of  Cybersecurity: Authentication,  Authorization and the CIA Triad"},"content":{"rendered":"\n<p>Confidentiality, Integrity, and availability \u2013 colloquially known as the CIA triad \u2013 in conjunction <br>with authentication and authorization make up the foundation of information security. This <br>guidance helps organizations formulate security plans, policies, and procedures that enable them <br>to keep safe the information of their customers as well as their own networks. Confidentiality, <br>which is typically stated first in the CIA triad, means to keep information out of the control or <br>view from anyone that does not have authorized access. The second, integrity, means that <br>information or data shall not be altered \u2013 whether it is data at rest or in transit. Many times, this <br>can be facilitated through version control, read-only documents or files, cryptology, logs, and via <br>other means. Lastly, availability means that the information is readily accessible for authorized <br>users. While the CIA triad is not exhaustive, there are other tools that can strengthen CIA such as <br>authentication and authorization.<br><br>Authentication and Authorization <br>Authentication is a way to verify that somebody is, in fact, who they claim to be. This <br>could be something you are, something you know, or something you have. A few examples of <br>these things are biometrics (something you are), password (something you know), RSA token <br>(something you have). While authentication of an individual proves who they are, authorization is a concept that challenges what permissions you have. As geeksforgeeks.org (2023) put it \u201cIn <br>the authentication process, the identity of users is checked for providing the access to the system. <br>While in the authorization process, the user\u2019s authorities are checked for accessing the <br>resources.\u201d While these actions alone won\u2019t keep users and organizations safe, they supplement <br>the CIA triad and, in conjunction with one another, provide a safer cyber environment for <br>everyone. <br><br>Example of the CIA Triad <br>ODU has a great model for the CIA in concert with authentication and authorization. The <br>school employs confidentiality through user control on their portals. Not just anyone on the <br>internet is able get onto ODU\u2019s student dashboard. One must first have an account with the <br>school, which is controlled by the system administrators, and is only given once accepted into <br>the university. ODU then employs a method of authentication via Duo Mobile 2fa \u2013 something <br>you have. Integrity is considered through the use of password protected accounts. If you don\u2019t <br>have authorization to view or manipulate something, then you will not have access to the <br>protected information. Lastly, ODU achieves availability through the use of cloud services such <br>as Google Drive. This enables the university to host information on multiple platforms and <br>different, geographically separated servers.<br><br>Conclusion <br>The CIA triad, authentication, and authorization are a great foundation to establishing a <br>secure cyber environment. These building blocks give organizations a starting point, and serve as <br>a guide to protecting their networks and their customer\u2019s information. While these principals are <br>useful, technology grows at a rapid pace; and with the advent of AI, we are going to have to <br>modify these principals in a way that makes our networks stronger and more adaptable to <br>change.<br><br>REFERENCE: <br>GeeksforGeeks. (2023). Difference between Authentication and Authorization. GeeksforGeeks. <br>https:\/\/www.geeksforgeeks.org\/difference-between-authentication-and-authorization\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Confidentiality, Integrity, and availability \u2013 colloquially known as the CIA triad \u2013 in conjunction with authentication and authorization make up the foundation of information security. This guidance helps organizations formulate security plans, policies, and procedures that enable them to keep safe the information of their customers as well as their own networks. Confidentiality, which is&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dmaka001\/2023\/09\/24\/the-fundamental-principals-of-cybersecurity-authentication-authorization-and-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":27599,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/users\/27599"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/posts\/274\/revisions\/279"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dmaka001\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}