{"id":304,"date":"2024-12-02T17:00:01","date_gmt":"2024-12-02T17:00:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dymphine\/?p=304"},"modified":"2024-12-02T17:00:01","modified_gmt":"2024-12-02T17:00:01","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dymphine\/2024\/12\/02\/the-cia-triad\/","title":{"rendered":"The CIA Triad\u00a0"},"content":{"rendered":"\n<p>The CIA triad is model that stands for confidentiality, integrity, and availabilty with purpose keeping securing cyber information. The purpose of confidentiality is for keeping sensitive information confidential, only allowing access to those who are allowed to access it. The purpose of integrity is keeping information correct, and the purpose of availability is making sure information is available to those who are allowed to access it. An example of the CIA triad is encryption which checks the integrity of information (CIA triad: Confidentiality, integrity, and availability). Authentication is a system to determine to check the name of a person for something (Authentication vs.Authorization). Authorization determines whether that person has access or not (Authentication vs. Authorization).&nbsp;<\/p>\n\n\n\n<p>Works Cited&nbsp;<\/p>\n\n\n\n<p>\u201cCIA Triad: Confidentiality, Integrity, and Availability.\u201d <em>SailPoint<\/em>, SailPoint, 13 Dec. 2023, www.sailpoint.com\/identity-library\/cia-triad.&nbsp;<\/p>\n\n\n\n<p>\u201cAuthentication vs. Authorization: What\u2019s the Difference?\u201d <em>OneLogin<\/em>, OneLogin, <a href=\"text=Authentication%20and%20authorization%20are%20two,authorization%20determines%20their%20access%20rights\" target=\"_blank\" rel=\"noreferrer noopener\">www.onelogin.com\/learn\/authentication-vs-authorization#:~:text=Authentication%20and%20authorization%20are%20two,authorization%20determines%20their%20access%20rights<\/a>. Accessed 18 Sept. 2024.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA triad is model that stands for confidentiality, integrity, and availabilty with purpose keeping securing cyber information. The purpose of confidentiality is for keeping sensitive information confidential, only allowing access to those who are allowed to access it. The purpose of integrity is keeping information correct, and the purpose of availability is making sure&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dymphine\/2024\/12\/02\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":29961,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/posts\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/users\/29961"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/posts\/304\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/posts\/304\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/media?parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/categories?post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/tags?post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}