{"id":274,"date":"2022-09-26T03:37:20","date_gmt":"2022-09-26T03:37:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kristrinidad\/?p=274"},"modified":"2022-09-26T03:37:23","modified_gmt":"2022-09-26T03:37:23","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kristrinidad\/2022\/09\/26\/the-cia-triad\/","title":{"rendered":"The CIA TRIAD"},"content":{"rendered":"\n<p><br><br>The CIA Triad is a model meant to guide policies for information security in an organization. Its<br>services provide the curriculum for successfully commanding how an organization protects data<br>and assesses how the data is stored. CIA stands for Confidentiality, integrity, and availability.<br>Each of the triad&#8217;s attributes stands for a crucial element of information security. However, it is<br>also referred to as the availability, integrity, and confidentiality (AIC) Triad so it doesn\u2019t become<br>commonly confused with the Central Intelligence Agency (CIA). Confidentiality says that without<br>permission, no one should view or read data. It also ensures that only people permitted to<br>access the data can do so. Integrity says that no data should ever be altered or corrupted. Data<br>is presumed to remain in its intended state and can only be modified by parties with the<br>appropriate authority. Availability says that data must be available upon proper request. It<br>guarantees that when needed, authorized parties can access data without restriction.<br>Authentication and authorization are both necessary information security processes that are<br>used as protection for systems and information. Individually they both have specific tasks, but<br>they work together to create a strong security process that protects thousands of systems<br>worldwide. Authentication is a process of verifying the validity of information trying to pass<br>through a system, and authorization is giving consent, or access, for something to be passed<br>through the system. An example of the two would be a student attempting to log into their ODU<br>portal. First, the system needs to go through authentication to ensure the student is enrolled at<br>the given university. They get this authentication from the student signing in with their MIDAS<br>username and password. After that, the student needs DUO, the mobile app, to allow them to<br>fully sign in. Once the student opens their phone and either types in their number code or allows<br>the \u2018push\u2019, the student is then given authorization to fully access their account. Authentication<br>and authorization go hand and hand with one another, and they continuously protect information<br>and security throughout cybersecurity.<br>https:\/\/www.cisecurity.org\/insights\/spotlight\/ei-isac-cybersecurity-spotlight-cia-triad<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is a model meant to guide policies for information security in an organization. Itsservices provide the curriculum for successfully commanding how an organization protects dataand assesses how the data is stored. CIA stands for Confidentiality, integrity, and availability.Each of the triad&#8217;s attributes stands for a crucial element of information security. However, it&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kristrinidad\/2022\/09\/26\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":24937,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/users\/24937"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/posts\/274\/revisions\/280"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kristrinidad\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}