{"id":314,"date":"2023-04-16T22:34:10","date_gmt":"2023-04-16T22:34:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/?p=314"},"modified":"2023-04-16T22:34:10","modified_gmt":"2023-04-16T22:34:10","slug":"diving-into-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/2023\/04\/16\/diving-into-the-cia-triad\/","title":{"rendered":"Diving into the CIA Triad"},"content":{"rendered":"\n<p>What is the Cia Triad?<br>The CIA triad is split up into 3 sections, which are confidentiality integrity and availability. Each<br>section has its own role, purpose, and responsibilities in the CIA Triad. The whole CIA Triad\u2019s<br>purpose is to provide a security layout for companies and businesses. The article supports this<br>with this statement: \u201cWhat is the CIA triad? Confidentiality, integrity and availability, also known<br>as the CIA triad, is a model designed to guide policies for information security within an<br>organization.\u201d(Chai 2022). In this document I will break down the CIA Triad\u2019s three sections and<br>define and describe them.<br>Confidentiality<br>This section is pretty straightforward. Information and access is limited to those who are<br>authorized or those who are permitted to it. For example, authorized users are given unique<br>passcodes or maybe keycards to access important information and the database. There can be<br>different levels of access or authorization in a company. Some members may have a higher<br>level of authorization based on their position in the organization. With Confidentiality<br>unauthorized access will not be possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the Cia Triad?The CIA triad is split up into 3 sections, which are confidentiality integrity and availability. Eachsection has its own role, purpose, and responsibilities in the CIA Triad. The whole CIA Triad\u2019spurpose is to provide a security layout for companies and businesses. The article supports thiswith this statement: \u201cWhat is the CIA&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/2023\/04\/16\/diving-into-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":26175,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/314"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/users\/26175"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/comments?post=314"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/314\/revisions"}],"predecessor-version":[{"id":315,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/314\/revisions\/315"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/media?parent=314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/categories?post=314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/tags?post=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}