{"id":321,"date":"2026-04-16T17:43:09","date_gmt":"2026-04-16T17:43:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jpabl004\/?p=321"},"modified":"2026-04-16T17:43:09","modified_gmt":"2026-04-16T17:43:09","slug":"pillars-of-cia-triad-cyse200t","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jpabl004\/2026\/04\/16\/pillars-of-cia-triad-cyse200t\/","title":{"rendered":"Pillars of CIA Triad CYSE200T"},"content":{"rendered":"\n<p>Julian Pablo<\/p>\n\n\n\n<p>Old Dominion University<\/p>\n\n\n\n<p>CYSE200T<\/p>\n\n\n\n<p>Professor Skip Hiser<\/p>\n\n\n\n<p>15 February 2026<\/p>\n\n\n\n<p>CIA Write Up<\/p>\n\n\n\n<p class=\"has-text-align-center\">Pillars of CIA Triad<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BLUF: The CIA triad acts as foundational pillars that cover the most basic but important part of any security plan including confidentiality, integrity, and accessibility.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The first pillar of the triad is confidentiality; it\u2019s the assurance that private information is out of the reach from the general public. The general way to do this is to classify what data is considered public, private, and top secret (Chai, 2022). The people who are given permission to this information should be the only ones who have access to this information.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A breach in confidentiality means private or secret information to be leaked. This can severely compromise an organization as it would mean private information spreading to masses rapidly\u2014information that could be leaked includes company records, customer PII, and<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The next pillar of the triad is integrity; it\u2019s the confirmation that data is correct and hasn\u2019t been changed by unauthorized individuals. This ensures reliability in an organizations data and what\u2019s inputted is actually correct.&nbsp;<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Compromised integrity could lead to errors in databases. Hackers could either change employee profiles or even delete entire files of data (Cawthra, 2020).<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The last pillar is availability; it makes sure that systems and databases are accessible to employers and customers when needed. Essentially workers should have access to the databases that are authorized to them in order to complete their tasks, and customers should have access to the service 24\/7 whenever they need to shop or contact a company (Chai, 2022).<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Loss of availability means loss of access for everyone. An example would be if amazon service were to randomly shut down. This means customer can no longer receive or make order and employees can\u2019t process or access what orders need to be done. This is why availability is crucial as it could be mean the shut down of a whole system.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Authentication and authorization acts as extensions of availability. They may all sound very similar, but they serve different purposes.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Authentication is the verification of whether the person is the person of who they say they are. This is typically your username and passwords but there are other ways to verify as well. Most companies have a multi factor authentication where aside from password they use others keys like a keycard or bio scanners.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Authorization makes sure a person only has access to the resources that they have permissions for (Auth0, n.d). For example, someone who has private clearance can access data that is classified as private, but the person cannot access top secret data as their permission isn\u2019t high enough.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In conclusion, the CIA triad is an essential part of information security (Auth0, n.d). Keeping data private from the public, ensuring reliability of data, and having consistent access are all key components that should constantly be considered. The triad is a foundation to any security plan that wouldn\u2019t operate properly without it.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p>Auth0 Docs<em>. Authentication vs. authorization<\/em>. (n.d.). https:\/\/auth0.com\/docs\/get-started\/identity-fundamentals\/authentication-and-authorization<\/p>\n\n\n\n<p>Cawthra, J. (2020, December). <em>Executive summary \u2014 NIST SP 1800-26 documentation<\/em>. NCCOE. https:\/\/www.nccoe.nist.gov\/publication\/1800-26\/VolA\/index.html<\/p>\n\n\n\n<p>Chai, W. (2022). <em>What is the CIA triad<\/em>. What is the CIA Triad? Definition, Explanation, Examples. https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Julian Pablo Old Dominion University CYSE200T Professor Skip Hiser 15 February 2026 CIA Write Up Pillars of CIA Triad &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BLUF: The CIA triad acts as foundational pillars that cover the most basic but important part of any security plan including confidentiality, integrity, and accessibility. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The first pillar of the triad is confidentiality; it\u2019s&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jpabl004\/2026\/04\/16\/pillars-of-cia-triad-cyse200t\/\">Read More<\/a><\/div>\n","protected":false},"author":32171,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/posts\/321"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/users\/32171"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/posts\/321\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}