{"id":278,"date":"2023-02-05T16:19:59","date_gmt":"2023-02-05T16:19:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ktomas\/?p=278"},"modified":"2023-02-05T16:19:59","modified_gmt":"2023-02-05T16:19:59","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ktomas\/2023\/02\/05\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>The CIA triad represents the fundamentals of cybersecurity, one element would not be able to exist without the other. The \u201cC\u201d in the triad means confidentiality, it&#8217;s the rules and regulations that limit the access to sensitive information. The \u201cI\u201d means integrity; it&#8217;s the assurance that the information is accurate. The \u201cA\u201d means availability, it\u2019s a guarantee that the information will be there if anyone wants to access it.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Confidentiality<\/h1>\n\n\n\n<p>In confidentiality, data is categorized as by the amount of damage that will be done if the information is leaked to the public. To prevent the breach of confidentiality the company should train employees to recognize when an enemy is trying to compromise the documents and how they should conduct themselves as employees to not make it easy for the enemy to get their documents. Confidentiality is maintained by authentication of the user which is verifying the user by a pin number or password.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Integrity<\/h1>\n\n\n\n<p>For integrity, if data is moving from point a to point whether that be physical or digital it must not be changed, there needs to be rules and procedures to make sure that the only people that are able to see that data are authorized. To protect integrity the owner of the files or documents should be the only one with read and write access while the rest should have just read. Companies should also enforce documents to have a required digital signature as well as a log of who and when did someone make changes. Integrity is maintained by only allowing people that are authorized, which means has access to the documents, to view the documents.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Availability<\/h1>\n\n\n\n<p>This is so that data is also accessible to those that have the clearance to do so. The maintenance of the infrastructure that data is stored on is crucial to this element.&nbsp; To protect availability there needs to be systems in place that are current and up to date on their upgrades. If something is broken it needs to be fixed immediately or a work around should be provided, a recovery plan should be in case if something goes wrong and cannot be fixed.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion&nbsp;<\/h1>\n\n\n\n<p>The CIA triad is reinforced by each other because one cannot exist without the other. Authentication and authorization are a pivotal part of the equation. The triad will continue to evolve as technology advances but the basics will always remain the same.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><\/h1>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<p>Chai,&nbsp; Wesley. (2022). What is the CIA Triad? Definition,Explanation, Examples. In.<\/p>\n\n\n\n<p>Moss,&nbsp; Ryan. (2022). The CIA Triad, Authentication, and Authorization. In.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA triad represents the fundamentals of cybersecurity, one element would not be able to exist without the other. The \u201cC\u201d in the triad means confidentiality, it&#8217;s the rules and regulations that limit the access to sensitive information. The \u201cI\u201d means integrity; it&#8217;s the assurance that the information is accurate. The \u201cA\u201d means availability, it\u2019s&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ktomas\/2023\/02\/05\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":26185,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/278"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/users\/26185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/comments?post=278"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/278\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/278\/revisions\/279"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/media?parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/categories?post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/tags?post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}