{"id":290,"date":"2025-04-30T19:09:44","date_gmt":"2025-04-30T19:09:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/?p=290"},"modified":"2025-04-30T19:09:44","modified_gmt":"2025-04-30T19:09:44","slug":"the-cia-triad-availability-vs-authentication","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/2025\/04\/30\/the-cia-triad-availability-vs-authentication\/","title":{"rendered":"The CIA Triad: Availability vs. Authentication"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">BLUF<\/h1>\n\n\n\n<p class=\"has-medium-font-size\">The CIA Triad is a set of guidelines that have evolved over time into the standard for policies concerning information security. CIA stands for confidentiality, integrity, and availability. Confidentiality stands for the privacy of the information. Integrity involves how trustworthy the systems are that are in place to protect the information. Availability is how accessible the needed information is for authorized users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">The Triad<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">The CIA Triad is simply a set of guidelines to have a successful and protected entity, especially one with access to sensitive data. The CIA, also known as the AIC, is not only useful when building a security structure. It is also good to know to improve upon existing systems. It acts as a checklist of sorts to make sure businesses and corporations protect user data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Authentication vs Availability<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">The A in the CIA stands for availability, but how about another \u201cA\u201d, authentication? Authentication is the verification of the user and making sure information is coming from a reliable source. In the last letter from the CIA, (A) availability, it is about making sure verified users can access their information. Authentication is all about making sure the person or user is the correct person, especially if they are who they say they are. It goes hand in hand with confidentiality. For example, information needs to be kept protected from unauthorized access. It is very easy to gain unauthorized access to someone else\u2019s information. Therefore, more and more platforms require 2-step authentication when signing in, normally with something digital and physical: the password, a code, and a linked device. <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Conclusion<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">In conclusion,  the CIA Triad is a tried and true set of guidelines for the successful security of an entity or corporation. It stands to protect users and their sensitive data from cyberattacks and unauthorized use. It is also used when building new systems to make sure all precautions are taken. Although some argue that the CIA needs to be updated, it has been a solid foundation for the basics of cybersecurity. They are guidelines, not strict rules, they are meant to be enhanced and built upon, but not changed. Authentication being one of the many enhancements made to the system over the years.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">References<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Hashemi-Pour, C., &amp; Chai, W. (2023, December 21). What is the CIA triad?: Definition from TechTarget. WhatIs. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<br>Kolbach, A. (2023, July 27). Confidentiality, integrity, availability, authenticity, and non-repudiation. LinkedIn. https:\/\/www.linkedin.com\/pulse\/confidentiality-integrity-availability-authenticity-albert-kolbach\/<br>Neiva, C., Moss, Y., Burnham, K., &amp; Barker, P. (2025, February 21). What is the CIA triad? A principled framework for defining infosec policies. CSO Online. https:\/\/www.csoonline.com\/article\/568917\/the-cia-triad-definition-components-and-examples.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF The CIA Triad is a set of guidelines that have evolved over time into the standard for policies concerning information security. CIA stands for confidentiality, integrity, and availability. Confidentiality stands for the privacy of the information. Integrity involves how trustworthy the systems are that are in place to protect the information. Availability is how&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kalissa-daley\/2025\/04\/30\/the-cia-triad-availability-vs-authentication\/\">Read More<\/a><\/div>\n","protected":false},"author":30622,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/users\/30622"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/posts\/290\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kalissa-daley\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}