{"id":296,"date":"2025-12-10T17:56:08","date_gmt":"2025-12-10T17:56:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/?p=296"},"modified":"2025-12-10T17:56:08","modified_gmt":"2025-12-10T17:56:08","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/2025\/12\/10\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p><strong>What is The CIA Triad?<\/strong><\/p>\n\n\n\n<p><em>The security, accuracy, and accessibility of personnel information is the number one thing that people and organizations find important. The CIA triad was made to insure this outcome with authentication and authorization.<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Confidentiality<\/h1>\n\n\n\n<p>This is the part of the triad that \u201cis roughly equivalent to privacy\u201d ( Wesley, 2022). The main goal of confidentiality is to secure personal information from people that aren\u2019t allowed access. The amount of security depends on the organization and how important their information they have is. There are \u201cmethods used to ensure confidentiality is requiring an account number or routing number when banking online\u201d (Wesley, 2022)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Integrity<\/h2>\n\n\n\n<p>Integrity is implemented so people cannot just go in and change your personal information. This is done by adding a layer of permission to access control. This also helps to detect change of things \u201cthat might occur as a result of non-human-caused events such as an electromagnetic pulse\u201d (Wesley, 2022). EMP\u2019s may cause many different changes that may end up in deleting important information of organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Availability<\/h2>\n\n\n\n<p>This is to make sure that the information being secured is accessible whenever wherever. The hardware must be maintained somewhere that can be reached quickly in case of emergency. This system is also kept well updated to keep away from all types of new conflicts. For quick access \u201ca backup copy may be stored in a geographically isolated location\u201d (Wesley, 2022). This allows them to have a personal surveillance team to keep any conflicts out.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Authentication Vs. Authorization<\/h2>\n\n\n\n<p>Authentication and authorization are similar but have very minor differences. To be exact \u201cauthentication process relies on credentials\u201d (Kosinski, 2025). This includes the use of two step verification, passwords, finger print scans, and more. This is to allow evidence that the user is who is actually allowed to access the information being secured. Authorization is a little different. It is based on the user&#8217;s permission. This means, \u201cpolicies that detail what a user can access and what they can do with that access in a system\u201d Kosiniski, 2025). This is put into effect to make sure the information is only accessed by users that are more important.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The confidentiality, integrity, and availability of the triad is what keeps organizations and people secure of personal information being breached. This is put into check with the help of the authentication and authorization process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>Wesley, Chai \u201cWhat is the CIA Triad_ Definition, Explanation, Examples &#8211; TechTarget.pdf.\u201d 28 June 2022,<a href=\"drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view.\">What is the CIA Triad_ Definition, Explanation, Examples &#8211; TechTarget.pdf<\/a><\/p>\n\n\n\n<p>Kosinski, Matthew. \u201cAuthentication vs authorization.\u201d <em>Authentication vs. authorization: What\u2019s the difference?<\/em>, 15 Apr. 2025, www.ibm.com\/think\/topics\/authentication-vs-authorization?utm_source=chatgpt.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is The CIA Triad? The security, accuracy, and accessibility of personnel information is the number one thing that people and organizations find important. The CIA triad was made to insure this outcome with authentication and authorization. Confidentiality This is the part of the triad that \u201cis roughly equivalent to privacy\u201d ( Wesley, 2022). The&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/2025\/12\/10\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31617,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/users\/31617"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}