{"id":296,"date":"2023-04-24T03:30:57","date_gmt":"2023-04-24T03:30:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/?p=296"},"modified":"2023-04-24T03:30:57","modified_gmt":"2023-04-24T03:30:57","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/2023\/04\/24\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>The CIA Triad<\/p>\n\n\n\n<p>The CIA Triad is a model used by organizations to guide policies for information security. The acronym CIA stands for confidentiality, integrity, and availability. In this model, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people (Chai 2022). The confidentiality concept is created to protect sensitive information that an organization holds. Preventing the release of such information is vital, and if companies are not careful, they could experience serious consequences. The concept of integrity is extremely important in an organization. If data is not accurate or trustworthy, it can cause problems with reliability, and users simple not having faith in the company. Availability is created so that data and information should always be accessible to those authorized to view it. If data is not readily available to users, it could cause serious issues, especially if tasks need to be completed in a timely matter.<\/p>\n\n\n\n<p>Authentication and Authorization Authentication is the concept of determining if a user is who they claim to be (Auth0 2023). This prompts the user to provide valid credentials, such as an ID token, in order to prove their identity. Authorization is the concept of determining what a user is allowed to access (Auth0 2023). This is determined by policies and rules and provides the user with an access token. Authentication is done before authorization, and authorization can only be done after a successful authentication. A real-life example of authentication and authorization would be going through security at an airport. You show your passport or ID to authenticate your identity, then you present your boarding pass to a flight attendant to authorize you to get on the plane.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Refrences:<\/p>\n\n\n\n<p>Auth0. \u201cAuthentication vs. Authorization.\u201d Auth0 Docs, Auth0 Docs, 2023, auth0.com\/docs\/get-started\/identity-fundamentals\/authentication-and-authorization.<\/p>\n\n\n\n<p>Chai, Wesley. \u201cWhat Is the CIA Triad? Definition, Explanation, Examples.\u201d Tech Target, 28 June 2022.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad The CIA Triad is a model used by organizations to guide policies for information security. The acronym CIA stands for confidentiality, integrity, and availability. In this model, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ethanfrayne\/2023\/04\/24\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":26194,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/users\/26194"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanfrayne\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}