{"id":281,"date":"2023-04-24T20:01:04","date_gmt":"2023-04-24T20:01:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/karlierogers\/?p=281"},"modified":"2023-04-24T20:01:04","modified_gmt":"2023-04-24T20:01:04","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/karlierogers\/2023\/04\/24\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>The CIA Triad is made up of three components: Confidentiality, Integrity, and Availability.&nbsp;<\/p>\n\n\n\n<p>-Confidentiality prevents information from being accessed by unauthorized users. It could be briefly described as privacy. Confidentiality is used to ensure users&#8217; data is protected. Examples of confidentiality that users see is dual-authentication, tokens, and biometric validation. These examples encrypt your data, adding an extra layer of security.<\/p>\n\n\n\n<p>-Integrity protects information from being corrupted. Maintaining accuracy, trust, and consistency throughout datas\u2019 lifecycle. Integrity doesn&#8217;t always have to be about technology. Having integrity as a user is just as important. Using sensitive data responsibly and also looking out for potential insider threats.&nbsp;<\/p>\n\n\n\n<p>-Availability means that information can be readily available. Keeping software and hardware updated so there is not a loss of information. If there is a cyber attack and information is vulnerable, then it is not available for users to access.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The CIA Triad is important because it is a solid framework for cybersecurity measures and protection of information.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is made up of three components: Confidentiality, Integrity, and Availability.&nbsp; -Confidentiality prevents information from being accessed by unauthorized users. It could be briefly described as privacy. Confidentiality is used to ensure users&#8217; data is protected. Examples of confidentiality that users see is dual-authentication, tokens, and biometric validation. These examples encrypt your data,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/karlierogers\/2023\/04\/24\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":26269,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/posts\/281"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/users\/26269"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/posts\/281\/revisions"}],"predecessor-version":[{"id":282,"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/posts\/281\/revisions\/282"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/media?parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/categories?post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/karlierogers\/wp-json\/wp\/v2\/tags?post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}