{"id":517,"date":"2024-12-01T22:27:05","date_gmt":"2024-12-01T22:27:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kylie-henley\/?p=517"},"modified":"2024-12-01T22:34:47","modified_gmt":"2024-12-01T22:34:47","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kylie-henley\/2024\/12\/01\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p><br><em>I have conducted research from multiple articles to be able to best explain the following topics:<br>\u201cWhat does the CIA Triad stand for?\u201d \u201cWhat is the CIA Triad?\u201d and \u201cAuthentication vs<br>Authorization\u201d.<\/em><\/p>\n\n\n\n<p><br><strong>What does the CIA Triad stand for?<\/strong><br>The CIA triad stands for confidentiality, integrity, and availability. To avoid confusion with the<br>Central Intelligence Agency it is sometimes also known as the AIC triad (availability, integrity, and<br>confidentiality). Below is a breakdown of the three key concepts that form the CIA triad:<\/p>\n\n\n\n<p><br><strong>Confidentiality &#8211;<\/strong><br>The efforts of an organization to ensure data is kept secure and private from unauthorized<br>access. To ensure confidentiality, stringent data security measures are implemented according to<br>the categories. Data is commonly categorized depending on the amount and type of damage that<br>can be done if it were to be compromised. There are several ways confidentiality can be<br>compromised, including direct attacks from the attacker who\u2019s attempting to view, take, or alter<br>data within the database.<\/p>\n\n\n\n<p><br><strong>Integrity &#8211;<\/strong><br>Making sure that data is trustworthy and safe from tampering. The integrity of data is maintained<br>only if the data is consistent, accurate, and trustworthy. A system with integrity keeps data safe<br>from unnecessary changes, whether it be accidental or malicious. Steps must be taken to ensure<br>data is not changed in transit and to ensure that it cannot be altered by unauthorized people.<br><\/p>\n\n\n\n<p><strong>Availability &#8211;<\/strong><\/p>\n\n\n\n<p>Information must be consistently and readily available to authorized users. Even if data is kept<br>confidential and its integrity is maintained, it would be useless if it was not available to those<br>within the organization. This involves making sure that the hardware, technical infrastructure, and<br>systems are properly maintained to hold and display the information.<\/p>\n\n\n\n<p><br><strong>What is the CIA Triad?<\/strong><br>The CIA triad is a guided model of policies for information security within an organization. The<br>CIA triad is crucial to the operation of an organization. It provides a high-level framework for<br>cybersecurity professionals to consider when providing certain tasks for organizations like<br>auditing, implementing, and improving systems, tools, and programs. When all three standards<br>are met, the security profile of the organization is stronger and better equipped to handle threats,<br>like data breaches.<\/p>\n\n\n\n<p><br><strong>Authentication vs Authorization<\/strong><br>Authentication and authorization are two key roles in information security processes that<br>administrators use to protect systems and information.<\/p>\n\n\n\n<p><br>Authentication is the process of authenticating a user, to ensure they are who they say they are.<br>There are many forms of authentication. Some examples of authentication are passwords and<br>security questions because only you would know your password or security question. Another<br>common type of authentication uses something you have. For example, getting a One Time Pin<br>(OTP) via SMS, email, or an app. It verifies your identity because it is your device.<\/p>\n\n\n\n<p><br>Authorization is a security process that determines the level of access a user or service is<br>granted. We use authorization to give users or services permission to access some of the data or<br>perform a particular action. In a secure environment, authorization is always followed by<br>authentication. Users must first confirm their identities before the organization&#8217;s administrations<br>grant them access to the requested resources.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>In conclusion, the CIA triad, authentication, and authorization all play crucial roles in keeping data<br>safe and secure against growing cyberthreats. The CIA triad is vital to information security since it<br>enhances security procedures and helps organizations. Authentication and authorization are also<br>vital to maintaining secure databases. When you first authenticate a user before granting<br>authorization, you will guarantee they are authorized to access the data and not someone with<br>malicious intent.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p><br>What is the CIA triad (confidentiality, integrity and availability) &#8211;<br><a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA\">https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<\/a><br><\/p>\n\n\n\n<p>CIA Triad &#8211;<br><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad#:~:text=The%20three%20letters%20in\n%20%22CIA,the%20development%20of%20security%20systems\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad#:~:text=The%20three%20letters%20in<br>%20%22CIA,the%20development%20of%20security%20systems<\/a><br><\/p>\n\n\n\n<p>Authentication vs Authorization &#8211;<br><a href=\"https:\/\/www.fortinet.com\/de\/resources\/cyberglossary\/authentication-vs-authorization#:~:text=Auth\nentication%20is%20a%20process%20to,access%20based%200n%20that%20level\">https:\/\/www.fortinet.com\/de\/resources\/cyberglossary\/authentication-vs-authorization#:~:text=Auth<br>entication%20is%20a%20process%20to,access%20based%200n%20that%20level<\/a><\/p>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have conducted research from multiple articles to be able to best explain the following topics:\u201cWhat does the CIA Triad stand for?\u201d \u201cWhat is the CIA Triad?\u201d and \u201cAuthentication vsAuthorization\u201d. What does the CIA Triad stand for?The CIA triad stands for confidentiality, integrity, and availability. To avoid confusion with theCentral Intelligence Agency it is sometimes&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kylie-henley\/2024\/12\/01\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":29373,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/517"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/users\/29373"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/comments?post=517"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/517\/revisions"}],"predecessor-version":[{"id":519,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/posts\/517\/revisions\/519"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/media?parent=517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/categories?post=517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylie-henley\/wp-json\/wp\/v2\/tags?post=517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}