{"id":292,"date":"2026-04-20T03:11:30","date_gmt":"2026-04-20T03:11:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/iperk003\/?p=292"},"modified":"2026-04-20T03:11:30","modified_gmt":"2026-04-20T03:11:30","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/iperk003\/2026\/04\/20\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"<h2>The CIA Triad<\/h2>\n<p>The CIA Triad is a cybersecurity model that guides information security policies, comprising three interconnected principles: Confidentiality, Integrity, and Availability, sometimes referred to as the AIC Triad to avoid confusion with the Central Intelligence Agency. [cite: 268, 269] According to the Chai article, it helps organizations develop focused security strategies, although experts note that it may require updates for modern threats, such as big data and IoT. [cite: 270]<\/p>\n<ul>\n<li><strong>Confidentiality:<\/strong> Limits access to sensitive information, preventing unauthorized disclosure. [cite: 271] Equivalent to privacy, data is categorized by potential damage if leaked. [cite: 272]<\/li>\n<li><strong>Integrity:<\/strong> Ensures data remains accurate, consistent, and trustworthy throughout its lifecycle, protecting against unauthorized alterations. [cite: 273]<\/li>\n<li><strong>Availability:<\/strong> Guarantees reliable access for authorized users, maintaining systems against disruptions. [cite: 273]<\/li>\n<\/ul>\n<h3>Authentication vs. Authorization<\/h3>\n<p>Authentication verifies a user&#8217;s identity using credentials like passwords, biometrics, or tokens. [cite: 274, 275] Authorization determines what authenticated users can access or do after post-authentication. [cite: 276]<\/p>\n<p><strong>Key Difference:<\/strong> Authentication confirms who you are; authorization decides what you can do. [cite: 277]<\/p>\n<p><em>Example:<\/em> Logging into your email with a password (authentication) lets you access your inbox, but authorization restricts you from viewing a colleague&#8217;s private folders unless granted permissions. [cite: 278]<\/p>\n<hr>\n<p><small><strong>Sources:<\/strong> What is the CIA Triad and Why is it important? | Fortinet (https:\/\/www.fortinet.com\/resources\/cyberglossary\/authentication-vs-authorization) [cite: 279, 280]<\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad The CIA Triad is a cybersecurity model that guides information security policies, comprising three interconnected principles: Confidentiality, Integrity, and Availability, sometimes referred to as the AIC Triad to avoid confusion with the Central Intelligence Agency. [cite: 268, 269] According to the Chai article, it helps organizations develop focused security strategies, although experts&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/iperk003\/2026\/04\/20\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31555,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/users\/31555"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/posts\/292\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iperk003\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}