{"id":295,"date":"2025-04-17T13:59:23","date_gmt":"2025-04-17T13:59:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/evansportfolio\/?p=295"},"modified":"2025-04-17T14:06:52","modified_gmt":"2025-04-17T14:06:52","slug":"write-up-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/evansportfolio\/2025\/04\/17\/write-up-the-cia-triad\/","title":{"rendered":"Write-Up: The CIA Triad"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6638a018e276977da763b9bdc17bb270\">Demetrius Evans<br>CYSE 200T<br>February 16th 2025<br>Professor Duvall<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-8fb689ebf111d81ecbc0a89554bc64c8\" style=\"font-size:25px\"><br>The CIA Triad, Authentication, and Authorization<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-afd65cddfd7ff87f1b08594e867a0c2a\">BLUF: The CIA (Confidentiality, Availability, Integrity) Triad is a checklist for I.T workers that creates better security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-dd352a576e7b3a85c4bb6d84cfe9f711\" style=\"font-size:25px\">The Triad<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-74d8f922a382b87c7e43d6deb1425ed2\"><br>The C in the CIA triad stands for confidentiality, which means privacy of the data in company (Chai, 2022). Confidentiality is about securing data by limiting access to it (Fortinet, 2025). The other two components, integrity and availability, are both built around this central idea of security. Integrity is about ensuring your data is not tampered with by unauthorized people (Chai, 2022). Integrity makes sure your data remains trustworthy, reliable, and accurate (Fortinet, 2025). The last part of the triad, availability, makes sure that the appropriate parties can access or change your data (Chai, 2022). Availability is all about keeping data easily accessible to authorized parties only (Chai, 2022).<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-cb6fa60e0ddf8da2c2edebfdde3291d8\" style=\"font-size:25px\"><br>Authentication and Authorization<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-3157012b0aece2e537da538796c0f90c\">Authentication and authorization are two main components of availability. Authentication involves cataloging users and checking if they are who they claim (Okta, 2024). Biometrics, passwords, or pins are three examples of authentication (Okta, 2024). Authentication checks that the user has access to the requested data or resources (Okta, 2024). Authorization should require permission from the owner of the data to access it (Okta, 2024). An example of authentication and authorization would be trying to access Professor Duvall\u2019s reading monitor. To access it, you first need to log into your google account and then your Canvas, this would be the authentication, then you would need to click on the reading monitor. If you are not logged into google using your school email, you will not have access to the monitor and either must request access or try again with your ODU email, which would be the authorization part of this example.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-425de6b25316b3da0b45793429b69878\" style=\"font-size:25px\"><br>Conclusion<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-45ae50bf539c3b49b29a29199a6db4a2\"><br>Overall, the CIA Triad, along with authentication and authorization, are the core components of cyber security. Together they provide a checklist to ensure the basic security of your data and resources.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Demetrius EvansCYSE 200TFebruary 16th 2025Professor Duvall The CIA Triad, Authentication, and Authorization BLUF: The CIA (Confidentiality, Availability, Integrity) Triad is a checklist for I.T workers that creates better security. The Triad The C in the CIA triad stands for confidentiality, which means privacy of the data in company (Chai, 2022). Confidentiality is about securing data&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evansportfolio\/2025\/04\/17\/write-up-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":30493,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/users\/30493"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/posts\/295\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evansportfolio\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}