{"id":205,"date":"2025-11-23T17:24:01","date_gmt":"2025-11-23T17:24:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/?p=205"},"modified":"2025-11-23T17:24:01","modified_gmt":"2025-11-23T17:24:01","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/2025\/11\/23\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>Jonathan Rice<\/p>\n\n\n\n<p>The Meaning of the CIA\/AIC Triad and Authentication vs<br>Authorization<br>The CIA Triad stands for Confidentiality, Integrity, and Availability. It is a<br>set of rules and ideas companies follow in order to build and keep the trust of their<br>consumers. Authentication is the means to get conformation that someone has the<br>knowledge to access and hopefully has ownership over an account. Authorization<br>means giving an account permission to do certain things. (Chai, 2022 pp. 1-2)<\/p>\n\n\n\n<p><br>The C in CIA Triad<\/p>\n\n\n\n<p><br>The C in CIA stands for confidentiality, in which the goal is to keep their<br>customers\u2019 information safe and private and to keep any unwanted eyes from<br>prying open a customer\u2019s details. (Chai, 2022 pp. 3-4)<br><\/p>\n\n\n\n<p>The I in CIA Triad<\/p>\n\n\n\n<p><br>The I in CIA stands for integrity, in which the goal is to maintain any<br>information the customer has given so that it cannot be changed unless authorized<br>by someone with the authority to do so. (Chai, 2022 p. 4) <\/p>\n\n\n\n<p>The A in CIA Triad<br><\/p>\n\n\n\n<p>The A in CIA Triad stands for availability, in which the goal is to make sure<br>whatever service being provided continues to be provided. (Chai, 2022 pp. 4-5)<br>The Meaning of Authentication<br>Authentication \u201cIs the process of ensuring ownership of an account\u201d<br>(Epping, et al., 2021 p. 4) meaning it takes some step to double check some form<br>of information to make sure that whoever is trying to access the account is fit to do<br>so.<\/p>\n\n\n\n<p><br>The Meaning of Authorization<\/p>\n\n\n\n<p><br>Authorization \u201cdetermines if you as the subject are allowed to access or do<br>whatever action you are trying to do.\u201d (Epping, et al., 2021 pp. 5-6) meaning once<br>you have access to an account after authentication you are then checked on what<br>authorization you have which decides what abilities\/permissions you have on a<br>system.<\/p>\n\n\n\n<p><br>In conclusion all of these things help create a secure environment for<br>employees and customers alike and to make an efficient and growing company.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>References:<br>Chai, W. (2022). What is the CIA Triad (confidentiality integrity and availability)?<br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-<br>availability-CIA?jr=on<br>Epping, M., &amp; Morowczynski, M. (2021). Authentication and<br>Authorization. IDPro Body of Knowledge, 1(6). https:\/\/doi.org\/10.55621\/idpro.78<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jonathan Rice The Meaning of the CIA\/AIC Triad and Authentication vsAuthorizationThe CIA Triad stands for Confidentiality, Integrity, and Availability. It is aset of rules and ideas companies follow in order to build and keep the trust of theirconsumers. Authentication is&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/2025\/11\/23\/the-cia-triad\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28422,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/posts\/205"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/users\/28422"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/comments?post=205"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/posts\/205\/revisions"}],"predecessor-version":[{"id":207,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/posts\/205\/revisions\/207"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/media?parent=205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/categories?post=205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jonathan-rice-eportfolio\/wp-json\/wp\/v2\/tags?post=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}