{"id":309,"date":"2025-04-16T14:03:07","date_gmt":"2025-04-16T14:03:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/?p=309"},"modified":"2025-04-24T13:55:02","modified_gmt":"2025-04-24T13:55:02","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/2025\/04\/16\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>BLUF: The CIA triad consists of Confidentiality, Integrity, and Availability; and used as a model to guide policies for information security in any organization.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Concepts of the CIA Triad<br><\/h2>\n\n\n\n<p>Confidentiality is very similar to privacy. It is designed to protect sensitive information from unauthorized access. Different types of data have different security levels. Integrity involves maintaining consistency, accuracy, and trustworthiness for data. It ensures that all procedures are being followed regarding data\u2019s protection. Availability makes sure data is easily accessible for authorized users. This includes keeping up with hardware and software.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Authorization vs. Authentication<br><\/h2>\n\n\n\n<p>Authorization and authentication are very similar and both deal with authorizing. Authorization is the act of giving permission to a user to access data; while authentication is verifying a user is an authorized user. For example, whenever an employer gives an employee access to changing payroll, that\u2019s an example of authorization. On the other hand, two-factor authentication is an example of authentication by using a different form of communication, like a text message, to verify the user is truly themselves.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<br><\/h2>\n\n\n\n<p>The CIA triad is a model used to guide policies for information security in any organization. There are three concepts of the CIA triad. Confidentiality is designed to protect sensitive information from unauthorized access. Integrity involves maintaining consistency, accuracy, and trustworthiness for data. Availability makes sure data is accessible to authorized users at any time. Authorization is the act of giving a user permission to access data. Authentication verifies that a user is authorized to access the data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>Chai, Wesley, <em>What is the CIA triad?<\/em> Wesley Chai,<\/p>\n\n\n\n<p>https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF: The CIA triad consists of Confidentiality, Integrity, and Availability; and used as a model to guide policies for information security in any organization. Concepts of the CIA Triad Confidentiality is very similar to privacy. It is designed to protect sensitive information from unauthorized access. Different types of data have different security levels. Integrity involves&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/2025\/04\/16\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":30427,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/posts\/309"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/users\/30427"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/posts\/309\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/posts\/309\/revisions\/317"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/media?parent=309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/categories?post=309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse200t\/wp-json\/wp\/v2\/tags?post=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}