{"id":282,"date":"2025-02-08T13:26:14","date_gmt":"2025-02-08T13:26:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/?p=282"},"modified":"2025-02-08T13:26:14","modified_gmt":"2025-02-08T13:26:14","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/02\/08\/the-cia-triad\/","title":{"rendered":"THE CIA TRIAD"},"content":{"rendered":"\n<p class=\"has-text-align-center\">                                                        MEASURES IN THE CYBER WORLD.                                         <br>                  BY FELIPE GONZALEZ<br>Three of the most important guided core principles we have in Cybersecurity are<br>what we call the CIA triad, these pillars are designed to help as a guide in creating<br>policies for information security to protect data. We will discuss why Confidentiality,<br>Integrity and Availability principles help us employ measures to create secure digital<br>environments and why the first is as important as the last.<br><br>CIA TRIAD:<br>CIA triad is considered the most integral part that entails cybersecurity as a<br>whole, imperative for risk, assets and mitigations protections are based on this model.<br>We will discuss the importance of each principle and their primary roles safeguarding<br>data.<br><br>Confidentiality:<br>Confidentiality in short is to be secured and privacy, that only those that need<br>access to networks are the only ones and not anybody else. Is ment to protect access<br>of unauthorized access attempts, key safeguard in protecting data and access to<br>sensitive information. Confidentially set rules that limit access to information flow, this<br>can include 1- Data encryption which transforms your data into a non-human readable<br>format, 2- Different classifications which categorized data based on confidentiality and<br>sensitivity, 3- Biometric verifications which uses unique to the users biological<br>characteristics like iris scans and fingerprints and most popular multifactor<br>authentication which is a method that requires more than one authentication.<br><br>Integrity:<br>Integrity might be considered like the copyright in the cyber world, it just means<br>that creators are in fact the creators and not something that has been altered on its<br>transfer. It is meant to ensure document trustworthiness on its original stage and has<br>not undergone unauthorized modifications aka \u201c digital notary\u201d, because it guarantees<br>authenticity of the original document. Some strategies used to safeguard your data<br>include 1- Hash functions to detect alterations, 2- Digital signatures to confirm authors<br>identity and 3- Guarantee unaltered electronic documents and Version control to track<br>changes.<br><br>Availability:<br>Availability is what it says it means, that it is available and only available to whom<br>is authorized. This will be your day today access to the systems and resources without<br>any hiccups. This principle is often left under-appreciated even though it is the very<br>means by which we can utilize data, if we are not able to connect to access our data, is<br>not a good day. It involves properly maintaining those systems, hardware and all the<br>infrastructure that holds all data. Key elements to ensure seamless user experience<br>might include 1- Uptime management which means all systems are green, minimizing<br>downtime and always working by rigorously maintaining all hardware, 2- SLA\u2019s that<br>outlines expected level of service and, 3- Redundancy and backup strategies to help<br>with unexpected disruptions.<br><br>Who needs to access what?<br>When it comes to the access of information it is very important to know who can<br>access what, by issuing specific roles and permissions, one can track what data can be<br>accessed and by whom, it all depends on the role of the individual. We can break it<br>down by authentications and authorizations.<br>While authentication can verify the individual identity by either one of the multiples<br>security features implemented on a system like as simple like a username and<br>password to as complex as biometrics verification, will be just to gain access to the<br>system, while authorization grants or denies access based on authenticated roles and<br>responsibilities granted to an individual, so they go hand in hand.<br><br>Conclusion:<br>As you can see, Confidentiality, integrity and availability are the pillars of creation in<br>cybersecurity. They play an important role in managing policies and principles, do they<br>need to be updated? Probably, but regardless if they do, these three principles are a<br>roadmap in helping us pursue a more secure digital environment and protect against<br>cyber threats.<br><br>References:<br>Cochran, Kodi A. \u201cThe CIA Triad: Safeguarding Data in the Digital Realm. \u201d Cybersecurity Essentials, Apress L. P, 2024, pp. 17\u201332, https:\/\/doi.org\/10.1007\/979-8-8688-0432-82.<br>_<br>Wesley Chai. \u201cWhat is the CIA Triad? Definition, Explanation, Examples &#8211; TechTarget PDF,<br>https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MEASURES IN THE CYBER WORLD. BY FELIPE GONZALEZThree of the most important guided core principles we have in Cybersecurity arewhat we call the CIA triad, these pillars are designed to help as a guide in creatingpolicies for information security to protect data. We will discuss why Confidentiality,Integrity and Availability principles help us employ measures to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/02\/08\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":30571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/users\/30571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/282\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}