{"id":283,"date":"2023-12-08T04:13:43","date_gmt":"2023-12-08T04:13:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jl26wp\/?p=283"},"modified":"2023-12-08T04:13:43","modified_gmt":"2023-12-08T04:13:43","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jl26wp\/2023\/12\/08\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p><br>Introduction<br>The CIA triad consists of three different aspects of the cybersecurity needs.<br>Confidentiality is the protection of important information from falling into the<br>wrong hands, integrity involves you constantly protecting the data over time, and<br>the availability of information should always be there for the people who are<br>supposed to have access to it.<br><\/p>\n\n\n\n<p>Why is it important?<br>The CIA Triad is important because it has a easy to understand framework for an<br>organization trying to upgrade their security. They can use the three aspects<br>together to develop a simple and balanced security method to gain trust with your<br>partners.<br><\/p>\n\n\n\n<p>Authentication &amp; Authorization<br>Authentication and authorization could be viewed as similar but they have their<br>differences in the types of security they are. Authentication means verifying the<br>identity of an individual through methods like logging in or two-factor<br>authentication while authorization is the system that grants or denies access to<br>information based on the identity that the individual is using. For example, say<br>you\u2019re typing a document for work and you needed feedback from your peers. You<br>have to determine who is authorized to view that certain document and the people<br>who were sent the document have to authenticate themselves to log into the<br>software the document is on.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IntroductionThe CIA triad consists of three different aspects of the cybersecurity needs.Confidentiality is the protection of important information from falling into thewrong hands, integrity involves you constantly protecting the data over time, andthe availability of information should always be there for the people who aresupposed to have access to it. Why is it important?The CIA&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jl26wp\/2023\/12\/08\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":27475,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/posts\/283"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/users\/27475"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/posts\/283\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/posts\/283\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/media?parent=283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/categories?post=283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jl26wp\/wp-json\/wp\/v2\/tags?post=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}