{"id":293,"date":"2026-04-27T17:55:19","date_gmt":"2026-04-27T17:55:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/?p=293"},"modified":"2026-04-27T17:59:27","modified_gmt":"2026-04-27T17:59:27","slug":"cybersecurity-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/2026\/04\/27\/cybersecurity-cia-triad\/","title":{"rendered":"Cybersecurity: CIA Triad"},"content":{"rendered":"\n<p class=\"has-text-align-left has-vivid-cyan-blue-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-cf360320e0445ad31679c07eaf1ef49c\">The CIA triad is defined as \u201ca model designed to guide policies for information security within an organization&#8221; (Chai, 2022). The triad consists of three components: confidentiality, integrity, and availability. Authorization and authentication also play a huge role in cybersecurity when working with the CIA triad. Authentication ensures who the user is, while authorization decides what the user should be allowed to do. All these components try to guarantee secure, controlled, and trustworthy access within the organizations.<br><strong>Confidentially<br><\/strong>The C in CIA is confidentiality. Confidentiality ensures that private information is kept secure. Organizations protect this information by using measures like encryption, passwords, PIN numbers, and multi-factor authentication. The most common example of organizations using confidentiality measures is PIN numbers on bank accounts. Since confidentiality is very important in organizations, it sometimes can require special training to \u201chelp familiarize authorized people with risk factors and how to guard against them&#8221; (Chai, 2022). Even though there are many measures made to ensure confidentiality, there are still ways that attackers can try and access private data.<br><strong>Integrity<\/strong><br>The next letter in the CIA triad stands for integrity. According to GeeksforGeeks (2025), integrity means ensuring \u201cthat data remains accurate, authentic, and unaltered during storage or transmission.\u201d It ensures that information is not changed in a manner with unauthorized users. An example of a company using integrity could be digital signatures within emails and forms.<br><strong>Availability<\/strong><br>The last letter in the CIA triad represents availability. Availability makes sure that information is \u201cconsistently and readily accessible for authorized parties&#8221; (Chai, 2022). This means that authorized users should be able to always see their information easily. An example of availability could be users being able to see how their money in the stocks that they invested in is doing. Availability can best be maintained by doing regular updates while also having backup systems if one fails.<br> <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA triad is defined as \u201ca model designed to guide policies for information security within an organization&#8221; (Chai, 2022). The triad consists of three components: confidentiality, integrity, and availability. Authorization and authentication also play a huge role in cybersecurity when working with the CIA triad. Authentication ensures who the user is, while authorization decides&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/elianalaquihon\/2026\/04\/27\/cybersecurity-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31953,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/users\/31953"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/posts\/293\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elianalaquihon\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}