{"id":295,"date":"2025-04-03T14:20:45","date_gmt":"2025-04-03T14:20:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/isaactano\/?p=295"},"modified":"2025-04-23T01:30:09","modified_gmt":"2025-04-23T01:30:09","slug":"write-up-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/isaactano\/2025\/04\/03\/write-up-the-cia-triad\/","title":{"rendered":"Write-up: The CIA Triad"},"content":{"rendered":"\n<p><strong>                                                              The CIA Triad<br>BLUF <\/strong>&#8211; The CIA Triad is a model that is designed to develop the basis of security<br>systems for organizations. CIA stands for Confidentiality, Integrity, and Availability, and is<br>also referred to as AIC to avoid confusion with the Central Intelligence Agency, C.I.A (Chai,<br>2022, p.1). The CIA Triad is important to the security of organizations as it is the backbone<br>of information security. Without it, an organization\u2019s database could be attacked and<br>exploited easily, leading events such as data loss or failure of operations.<\/p>\n\n\n\n<p><strong><br>What makes up the CIA?<\/strong><br>There are 3 key concepts that form the CIA triad. Confidentiality is essentially the<br>same as privacy; it ensures data remains secured and protected and allows only<br>authorized users to access important data. Security measures often include encryption,<br>multi-factor authentication, and other means of defense like firewalls or VPNs. Integrity<br>stands as a second line of defense for Confidentiality. The concept keeps data within the<br>organization consistent and accurate and ensures unauthorized access cannot alter it. This<br>can involve methods such as version control, digital signatures, backups, and<br>nonrepudiation measures like logins and messages sent (Chai, 2022, p.4). Availability is <br>less defensive than Confidentiality and Integrity, and more so on the proactive side. It<br>makes sure that authorized users have access to data and services at any time within the<br>organization, and practices include redundancy, failovers, and safeguards against data loss<br>(Chai, 2022, p.5)<\/p>\n\n\n\n<p><strong>Authentication and Authorization<br><\/strong>Authentication and authorization are often misinterpreted as the two share similar<br>meanings, but they are different in their own ways. Authentication is like a verification<br>barrier, where it verifies a user through methods such as a login, while authorization is like<br>a permission barrier, displaying what a user has and doesn\u2019t have authorized access to<br>(Difference Between Authentication and Authorization, 2024). A good example would be an<br>employee and their company\u2019s network. Authentication would be the employee logging<br>into the system with their username and password, and Authorization would be what the<br>employee has access to, like how if they were in HR, they could have access to employee\u2019s<br>records, but they don\u2019t have access to administrative tools, something only an admin can<br>access. While the two share a similar meaning, they are still different, and it is important to<br>know the difference between the two.<br><strong>Conclusion <\/strong>\u2013 The CIA Triad is essential for Cybersecurity, as it ensures data remains<br>protected and accurate, and is easily accessible to authorized users when necessary.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Work Cited<br>Chai, Wesley. What Is the CIA Triad? Definition, Explanation, Examples. TechTarget, 28 June<br>2022. PDF. https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view<br>GeeksforGeeks. &#8220;Di\u01aference Between Authentication and Authorization.&#8221; GeeksforGeeks,<br>24 July. 2024, www.geeksforgeeks.org\/di\u01aference-between-authentication-and-<br>authorization\/.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA TriadBLUF &#8211; The CIA Triad is a model that is designed to develop the basis of securitysystems for organizations. CIA stands for Confidentiality, Integrity, and Availability, and isalso referred to as AIC to avoid confusion with the Central Intelligence Agency, C.I.A (Chai,2022, p.1). The CIA Triad is important to the security of organizations&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/isaactano\/2025\/04\/03\/write-up-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":30487,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/users\/30487"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/posts\/295\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaactano\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}