{"id":317,"date":"2025-04-26T16:59:26","date_gmt":"2025-04-26T05:59:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/?p=317"},"modified":"2025-04-28T12:48:11","modified_gmt":"2025-04-28T01:48:11","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/2025\/04\/26\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>Glorionna Edwards-Cummings<\/p>\n\n\n\n<p>Professor Duvall<\/p>\n\n\n\n<p>Cybersecurity 200T<\/p>\n\n\n\n<p>February 16, 2025<\/p>\n\n\n\n<p>&#8212;<\/p>\n\n\n\n<p><strong>BLUF: <\/strong>The CIA Triad is an essential framework that serves multiple functions to ensure the safety and protection of information.<\/p>\n\n\n\n<p><strong>CIA Triad<\/strong><\/p>\n\n\n\n<p>The CIA Triad is a foundational guide that represents Confidentiality, Integrity, and Availability. Confidentiality refers to the restriction of accessibility to the unauthorized persons. It safeguards data by using a multitude of methods such as multifactor-authentication, access control, and checks. Integrity refers to protection of information from being altered and tampered with. It ensures that data is accurate and not modified by any unofficial parties. And finally, availability refers to the ease and reliability of obtaining material by an authorized person. Therefore, having backups, copies, and failover systems is critical to ensure this.<\/p>\n\n\n\n<p><strong>Authentication V.S Authorization<\/strong><\/p>\n\n\n\n<p>Authentication is identifying and verifying someone\u2019s validity to access a specific piece of information. Such examples include a password, fingerprint, or two-step authentication. However, authorization refers to the grant of access of said data. It is important to be aware of the distinction of the two as they are some-what similar, they serve different purposes within systems.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>The CIA Triad is a powerful framework that works as a foundation for risk protection, functionality, and security. Additionally, the model offers many services that aid in the privacy and guard of data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glorionna Edwards-Cummings Professor Duvall Cybersecurity 200T February 16, 2025 &#8212; BLUF: The CIA Triad is an essential framework that serves multiple functions to ensure the safety and protection of information. CIA Triad The CIA Triad is a foundational guide that represents Confidentiality, Integrity, and Availability. Confidentiality refers to the restriction of accessibility to the unauthorized&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/2025\/04\/26\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":30501,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/posts\/317"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/users\/30501"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/posts\/317\/revisions"}],"predecessor-version":[{"id":336,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/posts\/317\/revisions\/336"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/media?parent=317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/categories?post=317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/glorionnaedwards\/wp-json\/wp\/v2\/tags?post=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}