{"id":286,"date":"2024-02-03T23:00:59","date_gmt":"2024-02-03T23:00:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/?p=286"},"modified":"2024-02-03T23:00:59","modified_gmt":"2024-02-03T23:00:59","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/2024\/02\/03\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p><strong>The Foundations and Evolution of the CIA Triad in Cybersecurity<\/strong><br>The CIA triad, consisting of Confidentiality, Integrity, and Availability, is a foundational model<br>guiding information security policies within organizations. Confidentiality involves restricting<br>access to sensitive information, integrity ensures data accuracy and trustworthiness, and<br>availability ensures reliable access for authorized parties. The triad is crucial in cybersecurity,<br>guiding the development of security policies and helping organizations assess new technologies<br><\/p>\n\n\n\n<p>Confidentiality involves restricting access to sensitive information to prevent unauthorized<br>access. Examples of this include encryption which is a common method to ensure confidentiality.<br>For instance, when banking online, requiring an account number or routing number is a<br>confidentiality measure. Data encryption is also widely used to protect information during<br>transmission.<br><\/p>\n\n\n\n<p>Integrity ensures the consistency, accuracy, and trustworthiness of data throughout its lifecycle,<br>preventing unauthorized alteration. An example of this would be file permissions, user access<br>controls, and version control are measures to maintain data integrity. Cryptographic checksums<br>can be employed for verification, and digital signatures can provide nonrepudiation measures.<br><\/p>\n\n\n\n<p>Availability guarantees that information is consistently and readily accessible to authorized<br>parties. For example, rigorous maintenance of hardware, immediate hardware repairs, and a<br>properly functioning operating system are essential for ensuring availability. Redundancy,<br>failover, and disaster recovery plans help mitigate consequences when hardware issues occur.<br><\/p>\n\n\n\n<p><strong>Differences between Authentication and Authorization<\/strong><br><\/p>\n\n\n\n<p>Authentication is the process of verifying the identity of a user, system, or device. When a user<br>logs into a computer system, they typically provide a username and password. Multi-factor<br>authentication (MFA) is an enhanced method that requires two or more authentication factors,<br>such as a password and a unique code sent to a mobile device. Whereas Authorization determines<br>what actions or resources a verified user is allowed to access or perform. After a user has<br>successfully authenticated, authorization comes into play. For instance, an employee may be<br>authorized to access certain files or databases but not others. Authorization is about granting<br>appropriate permissions based on the user\u2019s identity.<br><\/p>\n\n\n\n<p>In summary, the CIA Triad emphasizes the principles of Confidentiality, Integrity, and<br>Availability, while Authentication and Authorization are distinct but interconnected concepts in<br>ensuring secure access and usage of information within a system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Foundations and Evolution of the CIA Triad in CybersecurityThe CIA triad, consisting of Confidentiality, Integrity, and Availability, is a foundational modelguiding information security policies within organizations. Confidentiality involves restrictingaccess to sensitive information, integrity ensures data accuracy and trustworthiness, andavailability&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/2024\/02\/03\/cia-triad\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28361,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/posts\/286"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/users\/28361"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/posts\/286\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/posts\/286\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/media?parent=286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/categories?post=286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elizabethfigueroa\/wp-json\/wp\/v2\/tags?post=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}