{"id":312,"date":"2024-04-15T17:25:00","date_gmt":"2024-04-15T17:25:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/?p=312"},"modified":"2024-04-15T17:25:00","modified_gmt":"2024-04-15T17:25:00","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/2024\/04\/15\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>In this assignment, I will be defining the CIA triad. I will be going over topics like the components<br>of CIA and what they stand for. I also will be listing the differences between authentication and<br>authorization.<br><\/p>\n\n\n\n<p><strong>What is the CIA triad?<\/strong><\/p>\n\n\n\n<p>The CIA triad, also known as Confidentiality, integrity, and availability, is a model designed<br>to guide policies for information security within an organization. The model is also known as the<br>AIC triad (availability, integrity, and confidentiality). This framework is key for helping<br>organizations upgrade and maintain maximum security while enabling staff to perform tasks like<br>data collection, customer service, and general management. The framework also helps data<br>professionals assess what went wrong during a malfunction or cybersecurity attack and how it<br>can be fixed. In determining when and where the framework happened, its unclear who exactly<br>created the framework, but some of the principles in it have been used by people like Julius<br>Caesar to safeguard critical information. Now, I will define what the CIA means.<br>To start, the \u201cC\u201d stands for confidentiality which involves protecting sensitive data private<br>and safe from unauthorized access. Confidentiality is on the same level as privacy. Confidentiality<br>measures are designed to prevent sensitive information from unauthorized access attempts. For<br>example, when you send emails, and you\u2019re directing the contents of the emails to a specific<br>person or group of people, the protections in place that keep your email private are measures<br>related to confidentiality. Some others are passwords, locks, and tokens.<br>The \u201cI\u201d stands for Integrity, which makes sure data and business analyst are accessing<br>accurate information. Its main objective is to make sure its protecting data from being modified<br>by unauthorized parties, accidentally by authorized parties, or by non-human-caused events like<br>an electromagnetic pulse or server crashes. Actions to maintain the integrity of information are<br>encryption, hashing, user access controls, checksums, version control, and backups. If a<br>company provides information about senior managers on your website, this information needs<br>these actions to maintain the integrity of information.<br>The \u201cA\u201d stands for availability, which makes sure systems, networks, and applications<br>must be functioning as they should and when they should. It also should be swift and readily<br>available when individuals need certain information. Availability sometimes can be tricky due to<br>natural occurrences like denial of service (DOS), power outages, or natural disasters.<br>While the CIA triad is a good framework to use for the protection of information, it also<br>comes with some challenges. Big data has been an issue the CIA triad has dealt with because of<br>the ever-increasing amount of data coming in. As technology grows, more devices are<br>implemented to the streams of data in a variety of forms. Another challenge is internet of things<br>privacy and security. When internet-enabled devices enter the market, some devices remain<br>unpatched or use weak passwords. Making it possible for attackers to steal information and<br>reveal information that should be private.<br><\/p>\n\n\n\n<p><strong>Conclusion<br><\/strong>The CIA triad is a framework that\u2019s based off confidentiality, which makes sure data is safe and<br>private. Integrity, which makes sure the information being accessed is accurate information. And,<br>Availability, which makes sure the systems, networks, and applications are functioning as they<br>should be when individuals need to access certain information. This framework is important<br>because its necessary it assessing what went wrong and where it went wrong, while also<br>knowing what did work. This then determines the weak points in systems allowing us to fix them.<\/p>\n\n\n\n<p><br><strong>References<br><\/strong>What is the CIA triad and why is it important?. Fortinet. (n.d.).<br>https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad<br>freeCodeCamp.org. (2021, April 28). The CIA triad &#8211; confidentiality, integrity, and availability<br>explained. https:\/\/www.freecodecamp.org\/news\/the-cia-triad-confidentiality-integrity-and-<br>availability-explained\/<br>What is the CIA triad?. Coursera. (n.d.). https:\/\/www.coursera.org\/articles\/cia-triad<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this assignment, I will be defining the CIA triad. I will be going over topics like the componentsof CIA and what they stand for. I also will be listing the differences between authentication andauthorization. What is the CIA triad?&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/2024\/04\/15\/the-cia-triad\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28140,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/posts\/312"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/users\/28140"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/posts\/312\/revisions"}],"predecessor-version":[{"id":315,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/posts\/312\/revisions\/315"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/media?parent=312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/categories?post=312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/tags?post=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}