{"id":288,"date":"2026-03-29T00:11:11","date_gmt":"2026-03-29T00:11:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/?p=288"},"modified":"2026-03-29T00:11:11","modified_gmt":"2026-03-29T00:11:11","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/2026\/03\/29\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>The CIA Triad is a cybersecurity model that consists of three components that are<br>recognized as the most essential in cybersecurity. These three components consist of<br>Confidentiality, Integrity and Availability. Starting with confidentiality, that is the aspect<br>that is focused on keeping data private and only accessible to authorized users. Integrity<br>is the part that focuses on information keeping its authenticity and consistency as well as<br>making sure that the data is secure and unaltered by unauthorized users as well. Lastly<br>Availability it\u2019s in the name. This aspect is just making sure that information is constantly<br>accessible for these authorized users meaning that the proper systems are in place to store<br>the information safely.<\/p>\n\n\n\n<p>Now I am going to discuss Authentication and Authorization. Authentication is the<br>step before authorization in which you just confirm your identity. The most common<br>form of authentication is typing in a password or if there is 2FA you push your<br>duomobile. Authorization on the other hand is giving a user permission to access a<br>certain location within a system. These 2 phrases are commonly used synonymously due<br>to authentication being all that you need most of the time. An example of this would be if<br>you were to log into google docs and wanted to access a document, logging in with your<br>email and password would be authentication while clicking on a specific document would<br>be authorization but because commonly authentication is the only step necessary these<br>two words get grouped up as having 1 purpose.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is a cybersecurity model that consists of three components that arerecognized as the most essential in cybersecurity. These three components consist ofConfidentiality, Integrity and Availability. Starting with confidentiality, that is the aspectthat is focused on keeping data private and only accessible to authorized users. Integrityis the part that focuses on information keeping&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kirubelbelay\/2026\/03\/29\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":32305,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/posts\/288"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/users\/32305"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/posts\/288\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/posts\/288\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/media?parent=288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/categories?post=288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kirubelbelay\/wp-json\/wp\/v2\/tags?post=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}