{"id":291,"date":"2025-04-28T17:11:40","date_gmt":"2025-04-28T17:11:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/?p=291"},"modified":"2025-04-28T17:11:40","modified_gmt":"2025-04-28T17:11:40","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/2025\/04\/28\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p><em>Most organizations use the CIA Triad as a foundational concept to create and execute efficient security systems. It is made up of three basic elements that are necessary for safeguarding sensitive data: confidentiality, integrity, and availability. However, these components are frequently misunderstood or confused for one another.&nbsp;<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CIA Triad<\/h3>\n\n\n\n<p>The CIA Triad is a model designed to guide policies for information security within an organization (Chai, 2022). This model consists of three different principles, confidentiality, integrity, and availability. It is a big model that is widely used to help organizations secure their systems and data. Considering these three principles together within the triad framework guides the development of security policies for organizations. When evaluating needs and use cases for potential new products and technologies, the triad helps organizations ask focused questions about how value is being provided in those three key areas (Hashemi-Pour, 2023).&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Authentication vs. Authorization<\/h3>\n\n\n\n<p>Authentication and authorization are two very similar things, but very different in terms of cybersecurity. Both of these terms serve different purposes in the process of granting access to systems and resources. <a href=\"https:\/\/www.ibm.com\/think\/topics\/authentication\">Authentication<\/a> verifies a user\u2019s identity. Authorization gives the user the right level of access to system resources (Kosinski, 2024). Authentication confirms a user, device, or system&#8217;s identity is known as authentication. It guarantees that the person or thing trying to use a resource is indeed who or what it says it is. While authorization establishes the rights or privileges granted to an authenticated entity, defining the resources or actions that they are permitted to take. Resources and apps can each have their own authentication methods. While logging into my ODU account I use duo authentication which is different from the authentication I use accessing my bank account. Authorization has user permissions that are usually defined by administrators and security leaders and later enforced by authorization systems. Example of authentication vs authorization: Authentication- using my banking app I enter my username and password, my bank then sends me a text message with a one time use code to verify that it is me. Authorization- after logging into my account the bank decides what I\u2019m allowed to do within the app.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>In conclusion, the CIA triad is a huge model used within most organizations to develop security systems. It has three components within it, that most individuals get confused with one another.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">References&nbsp;<\/h3>\n\n\n\n<p>Chai, W. <em>What is the CIA Triad? Definition, Explanation, Examples. <\/em>(2022, June 28).<em> <\/em>PDF. Retrieved February 17, 2025 from <a href=\"https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view\">https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view<\/a>.&nbsp;<\/p>\n\n\n\n<p><em>CIA triad<\/em>. (n.d.). Fortinet. Retrieved February 22, 2025, from<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad\"> https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad<\/a>.<\/p>\n\n\n\n<p>Hashemi-Pour, C. <em>Confidentiality, integrity, and availability (CIA)<\/em>. (2023, December). TechTarget. Retrieved February 22, 2025, from<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA\"> https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<\/a>.<\/p>\n\n\n\n<p>Kosinski, M. . <em>Authentication vs. authorization: What\u2019s the difference?<\/em> (2024, December 2) IBM. Retrieved February 22, 2025 from<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.ibm.com\/think\/topics\/authentication-vs-authorization\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Most organizations use the CIA Triad as a foundational concept to create and execute efficient security systems. It is made up of three basic elements that are necessary for safeguarding sensitive data: confidentiality, integrity, and availability. However, these components are frequently misunderstood or confused for one another.&nbsp; CIA Triad The CIA Triad is a model&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/2025\/04\/28\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":30441,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/users\/30441"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hannah-barry-5\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}