{"id":292,"date":"2025-04-27T08:14:03","date_gmt":"2025-04-27T08:14:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/?p=292"},"modified":"2025-04-27T08:14:03","modified_gmt":"2025-04-27T08:14:03","slug":"cia-triad-authentication-vs-authorization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/2025\/04\/27\/cia-triad-authentication-vs-authorization\/","title":{"rendered":"CIA Triad: Authentication vs. Authorization"},"content":{"rendered":"\n<p>BLUF: I will discuss the CIA Triad and the difference between Authentication and<br>Authorization.<br>CIA Triad<br>According to Wesley Chai\u2019s article, the CIA triad, also standing for Confidentiality<br>Integrity and Availability, is a framework policy used in Information security to maintain<br>security and is crucial in cybersecurity. CIA is sometimes also called the AIC triad to avoid<br>confusion with the Central Intelligence Agency. Confidentiality means to not share your<br>information with unwanted people. Integrity means making sure information is consistent<br>accurately trustworthy with its content. Finally, availability means information should<br>always be accessible to people who are authorized to access it.<br>Examples<br>An example of good confidentiality (according to Wesley Chai\u2019s article) is using two-factor<br>authentication alongside usernames and passwords. This ensures even if someone has<br>your information, they might not be able to access it still due to needing an email or phone<br>number or even your hand. An example of integrity (according to Wesley Chai\u2019s article) is<br>using checksums to check integrity and to see if a file has been messed with. Having logs<br>for checking logins, messages, and everyone who\u2019s viewed a file is also important in<br>checking integrity. An example of good availability is having a service available at most<br>times in the day. For example, most social media is up most days for every hour and when<br>it\u2019s not it is usually up later in the day. Social media usually has extremely good availability.<br>Authentication vs. Authorization<br>\u201cAuthentication is the act of validating that users are whom they claim to be.\u201d<br>(Authentication Vs. Authorization | Okta, n.d.) While authorization is \u201cthe process of giving<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>the user permission to access a specific resource or function.\u201d (Authentication Vs.<br>Authorization | Okta, n.d.) It is important to highlight the difference between as they are<br>very similar terms but are different and knowing the difference is important in the<br>cybersecurity field.<br>Conclusion<br>In conclusion, the CIA triad and its points are important to know in the cybersecurity<br>field to maintain a secure environment. The difference in Authentication and Authorization<br>while being small can have big impacts so it\u2019s important to know that too. Knowing all<br>these things is keen in this field so make sure to use all these points when maintaining and<br>managing security risks.<br>References<br>Shea, S. (2022, August 11). What is data security? The ultimate guide. Search Security.<br>https:\/\/www.techtarget.com\/searchsecurity\/Data-security-guide-Everything-you-need-to-<br>know<br>Authentication vs. Authorization | Okta. (n.d.). Okta, Inc. https:\/\/www.okta.com\/identity-<br>101\/authentication-vs-<br>authorization\/#:~:text=Authentication%20confirms%20that%20users%20are%20who%2<br>0they,world%20of%20identity%20and%20access%20management%20(IAM).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF: I will discuss the CIA Triad and the difference between Authentication andAuthorization.CIA TriadAccording to Wesley Chai\u2019s article, the CIA triad, also standing for ConfidentialityIntegrity and Availability, is a framework policy used in Information security to maintainsecurity and is crucial in cybersecurity. CIA is sometimes also called the AIC triad to avoidconfusion with the Central&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/2025\/04\/27\/cia-triad-authentication-vs-authorization\/\">Read More<\/a><\/div>\n","protected":false},"author":30491,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/users\/30491"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/posts\/292\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jucardcyse200t\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}