{"id":279,"date":"2023-04-17T00:02:51","date_gmt":"2023-04-17T00:02:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/j-tillman03\/?p=279"},"modified":"2023-04-17T00:02:51","modified_gmt":"2023-04-17T00:02:51","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/j-tillman03\/2023\/04\/17\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>Summary: This article discusses the CIA triad, which is a model designed to guide organizations<br>in managing their security. It also explains the differences between authentication and<br>authorization as well as provides an example of each.<br>The CIA Triad<br>The CIA triad is a security model designed to help organizations protect their information. It<br>outlines the three core components of information security: confidentiality, integrity, and<br>availability. Confidentiality ensures that only authorized people can access sensitive information.<br>Integrity ensures that information is accurate, complete, and secure. Availability ensures that<br>authorized users can access the information when needed.<br>Authentication &amp; Authorization<br>Authentication and authorization are two related but distinct concepts in information<br>security. Authentication is the process of verifying a user&#8217;s identity. This is usually done<br>through a username and password combination. Authorization, on the other hand, is the<br>process of granting access to resources based on a user&#8217;s identity. The user must first<br>be authenticated before authorization can be granted.<br>Example<br>For example, a university may use authentication to verify that a student is who they<br>claim to be. Once the student has been authenticated, they can then be authorized to<br>access various resources such as course registration or library materials.<br>Conclusion The CIA triad is an important<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: This article discusses the CIA triad, which is a model designed to guide organizationsin managing their security. It also explains the differences between authentication andauthorization as well as provides an example of each.The CIA TriadThe CIA triad is a security model designed to help organizations protect their information. Itoutlines the three core components of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/j-tillman03\/2023\/04\/17\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":26241,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/posts\/279"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/users\/26241"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/posts\/279\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/j-tillman03\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}