{"id":288,"date":"2024-11-17T23:12:43","date_gmt":"2024-11-17T23:12:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/favour-anene\/?p=288"},"modified":"2024-11-17T23:12:44","modified_gmt":"2024-11-17T23:12:44","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/favour-anene\/2024\/11\/17\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"The CIA Triad is a foundational concept in information security, representing three core<br \/>principles: Confidentiality, Integrity, and Availability.<br \/>Confidentiality: This principle ensures that sensitive information is accessed only by<br \/>authorized individuals. Techniques like encryption and access controls are used to protect data<br \/>from unauthorized access. For example, encrypting emails ensures that only the intended<br \/>recipient can read the content (Chai, 2023).<br \/>Integrity: Integrity involves maintaining the accuracy and completeness of data. It<br \/>ensures that information is not altered in an unauthorized manner. Methods such as checksums,<br \/>hash functions, and digital signatures help maintain data integrity. For instance, using a hash<br \/>function to verify that a downloaded file has not been tampered with (Chai, 2023).<br \/>Availability: This principle ensures that information and resources are available to<br \/>authorized users when needed. Measures like regular backups, disaster recovery plans, and<br \/>redundant systems help maintain availability. For example, a website using load balancing to<br \/>ensure it remains accessible even during high traffic periods (Chai, 2023).<br \/>Now, let&#8217;s discuss the differences between Authentication and Authorization:<br \/>Authentication: This is the process of verifying the identity of a user or system. It<br \/>answers the question, &#8220;Who are you?&#8221; Common methods include passwords, biometrics, and<br \/>multi-factor authentication. For example, when you log into your email account using a<br \/>username and password, you are authenticating yourself (Smith, 2023).<br \/>Authorization: This process determines what an authenticated user can do. It answers the<br \/>question, &#8220;What are you allowed to do?&#8221; Authorization is typically managed through access<br \/>control lists (ACLs) and role-based access control (RBAC). For example, after logging into a<br \/>corporate network, an employee may be authorized to access certain files but not others (Jones,<br \/>2023).<br \/><br \/>Example:<br \/>When you access an online banking system:<br \/>1. Authentication: You enter your username and password to prove your identity.<br \/>2. Authorization: Once authenticated, the system checks your permissions and allows you to<br \/>view your account balance but restricts access to administrative functions.<br \/><br \/>References:<br \/>&#8211; Chai, X. (2023). Understanding the CIA Triad in Information Security. Cybersecurity Journal.<br \/>&#8211; Smith, J. (2023). Authentication Methods and Best Practices. InfoSec Magazine.<br \/>&#8211; Jones, L. (2023). Authorization Techniques in Modern IT Systems. Security Today.","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is a foundational concept in information security, representing three coreprinciples: Confidentiality, Integrity, and Availability.Confidentiality: This principle ensures that sensitive information is accessed only byauthorized individuals. Techniques like encryption and access controls are used to protect datafrom unauthorized access. For example, encrypting emails ensures that only the intendedrecipient can read the content (Chai,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/favour-anene\/2024\/11\/17\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":24192,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/posts\/288"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/users\/24192"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/posts\/288\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/posts\/288\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/media?parent=288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/categories?post=288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/tags?post=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}