{"id":282,"date":"2024-02-01T19:33:59","date_gmt":"2024-02-01T19:33:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jwalk04\/?p=282"},"modified":"2024-02-01T19:33:59","modified_gmt":"2024-02-01T19:33:59","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jwalk04\/2024\/02\/01\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"The CIA Triad, also known as Confidentiality, Integrity, and Availability, is the household for<br \/>information security. The \u201cC\u201d stands for confidentiality making sure data is only accessible to<br \/>permitted people or systems. The \u201cI\u201d stands for integrity making sure the information received<br \/>is accurate and reliable ensuring it hasn\u2019t been tampered with. The A stands for Availability<br \/>making sure the information is ready when needed. The Triad is a framework for securing<br \/>information assets.<br \/>Authentication is a process to verify an identity of something trying to access its system. Would<br \/>ask questions like \u201cWho are you?\u201d. Authentication has to do with things like passwords and<br \/>usernames, usually some type of credential. Authorization has to deal with permissions and<br \/>accessibility. In my opinion authorization is something that has control over something. So once<br \/>a user\u2019s identity is founded all their information is in control of someone else. For example, if<br \/>someone was to guess another\u2019s bank information, that one person would have access over<br \/>something that isn\u2019t there\u2019s.<br \/>","protected":false},"excerpt":{"rendered":"<p>The CIA Triad, also known as Confidentiality, Integrity, and Availability, is the household forinformation security. The \u201cC\u201d stands for confidentiality making sure data is only accessible topermitted people or systems. The \u201cI\u201d stands for integrity making sure the information receivedis accurate and reliable ensuring it hasn\u2019t been tampered with. The A stands for Availabilitymaking sure&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jwalk04\/2024\/02\/01\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":28582,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/users\/28582"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/posts\/282\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}