{"id":361,"date":"2025-05-04T21:18:55","date_gmt":"2025-05-04T21:18:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/?page_id=361"},"modified":"2025-05-04T21:20:05","modified_gmt":"2025-05-04T21:20:05","slug":"write-up-cia-triad-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/write-up-cia-triad-2\/","title":{"rendered":"Write-Up: CIA Triad"},"content":{"rendered":"\n<p>Kwabena Asumadu<br>28\/02\/2025<br>Write Up: CIA Triad<br>Introduction<br>The CIA triad, which stands for Confidentiality, Integrity, and Availability, is a<br>fundamental model used to guide policies and practices in information security within<br>organizations. This model, also known as the AIC triad to avoid confusion with the<br>Central Intelligence Agency, consists of three core principles that are critical for data<br>protection and system security.<br>Confidentiality<br>Confidentiality, like privacy, protects sensitive information from unauthorized<br>access. It entails the deployment of access controls, encryption, and user authentication<br>mechanisms such as two-factor authentication (2FA), biometric authentication, and<br>security tokens. To ensure the confidentiality of information, online bank websites, for<br>example, use account numbers and passwords. Furthermore, training employees to<br>identify social engineering attacks prevents unauthorized data access.<br>Integrity<br>Integrity is the accuracy, consistency, and trustworthiness of information<br>throughout its entire existence. Data must not change while moving and be safe from<br>unauthorized entities. In ensuring data integrity, checksums, digital signatures, and<br>version control systems are important utilities. For instance, user access controls and<br>file permissions are barriers to unauthorized alteration, and backup systems allow the<br>restoration of data to its initial form if it is compromised.<br>Availability<br>Availability ensures information is always accessible to users with the right<br>credentials. This means staying up to date with hardware, staying current with systems,<br>and having sufficient bandwidth to prevent bottlenecks. Redundancy, failover, and<br>disaster recovery are crucial to preventing downtime. Cloud providers, for example, use<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>high-availability clusters to give users access to information even during<br>hardware failure.<br>Authentication vs. Authorization<br>Authentication and authorization, although frequently used in tandem, serve<br>different roles in information security. Authentication is the process of confirming the<br>identity of a user or system. This can be done through the use of passwords, biometrics,<br>or two-factor authentication. For example, when you log into your email account with a<br>password, you are authenticating yourself. Authorization, on the other hand, specifies<br>what an authenticated user is allowed to do. It sets permissions and access levels.<br>Continuing the email example, authorization decides what you can read, send, and<br>delete after logging in.<br>Conclusion<br>Consider the following: you enter a secure building, presenting your ID at the<br>entrance to verify who you are; this is called authentication. Once you&#8217;ve cleared that<br>door, the specific areas you&#8217;re permitted to visit; whether individual offices or individual<br>floors is based on your authorization. Grasping the nuances of the CIA triad and the<br>difference between authentication and authorization is critical to developing sound<br>security policies and safeguarding organizational information with success.<br>References:<br>1. Chai, W. (2022). What is the CIA Triad? Definition, Explanation, Examples.<br>TechTarget. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-<br>availability-CIA<br>2. TechTarget. (2022). The three CIA triad principles.<br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kwabena Asumadu28\/02\/2025Write Up: CIA TriadIntroductionThe CIA triad, which stands for Confidentiality, Integrity, and Availability, is afundamental model used to guide policies and practices in information security withinorganizations. This model, also known as the AIC triad to avoid confusion with theCentral Intelligence Agency, consists of three core principles that are critical for dataprotection and system security.ConfidentialityConfidentiality,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdotportfolio\/write-up-cia-triad-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28080,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/361"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/users\/28080"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/comments?post=361"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/361\/revisions"}],"predecessor-version":[{"id":373,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/361\/revisions\/373"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/media?parent=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}