{"id":282,"date":"2026-02-16T03:06:26","date_gmt":"2026-02-16T03:06:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jareda-h\/?p=282"},"modified":"2026-02-16T03:06:26","modified_gmt":"2026-02-16T03:06:26","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jareda-h\/2026\/02\/16\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"The Explanation of the CIA Triad<br \/>Definitions<br \/>\u2022 Confidentiality \u2013 protecting sensitive or private information from people without<br \/>access.<br \/>Example: When you are logging into your phone, there is a password or face ID<br \/>needed to open it.<br \/>\u2022 Integrity \u2013 keeping data accurate and making sure it is reliable and unchanged when<br \/>being sent.<br \/>Example: When applying for colleges your counselor transfers your transcript to<br \/>colleges, so your information is shown correctly.<br \/>\u2022 Availability \u2013 authorized users should be able to access the information whenever<br \/>they need to.<br \/>Example: Online shopping websites have backup servers for customers to continue<br \/>placing orders even when one is down.<br \/>Description of the CIA Triad<br \/>The CIA Triad is a practice that is used in cybersecurity to protect information systems. It is<br \/>based on three things. Confidentiality (maintaining the privacy of data), integrity<br \/>(maintaining the accuracy of data and it being unchanged), and availability (making data<br \/>accessible to authorized users whenever, wherever). These three principles are what help<br \/>keep the security of data and information safe. If one of them were to start weakening, the<br \/>entirety of the system could fail.<br \/>Differences and Examples of Authentication &amp; Authorization<br \/>Authentication is verifying the identity of a user before access is allowed, while<br \/>authorization is what the user is able to access after being allowed to browse around.<br \/>Authentication Examples:<br \/>\u2022 Scanning your fingerprint<br \/>\u2022 Scanning for a Face ID<br \/>\u2022 A one-time verification code<br \/>Authorization Examples:<br \/>\u2022 Admin privileges<br \/>\u2022 Medical records<br \/>\u2022 Bank statements<br \/>Conclusion<br \/>In conclusion, the CIA Triad is a cybersecurity model used to protect information systems<br \/>with the principles being Confidentiality, Integrity, and Availability. Authentication is used to<br \/>verify the user\u2019s identity, and authorization grants specific permission to private<br \/>information. When all this information is understood it creates the grounds for a secure<br \/>digital environment that can defend against cyber threats.<br \/>","protected":false},"excerpt":{"rendered":"<p>The Explanation of the CIA TriadDefinitions\u2022 Confidentiality \u2013 protecting sensitive or private information from people withoutaccess.Example: When you are logging into your phone, there is a password or face IDneeded to open it.\u2022 Integrity \u2013 keeping data accurate and making sure it is reliable and unchanged whenbeing sent.Example: When applying for colleges your counselor transfers&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jareda-h\/2026\/02\/16\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":32159,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/users\/32159"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/posts\/282\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jareda-h\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}