{"id":222,"date":"2026-04-19T12:25:18","date_gmt":"2026-04-19T12:25:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/?p=222"},"modified":"2026-04-19T12:25:18","modified_gmt":"2026-04-19T12:25:18","slug":"the-cia-triad-and-access-control-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/2026\/04\/19\/the-cia-triad-and-access-control-in-cybersecurity\/","title":{"rendered":"The CIA Triad and Access Control in Cybersecurity"},"content":{"rendered":"\n<p>At its core, the CIA Triad serves as the foundational framework of cybersecurity by shaping<br>how organizations protect information systems through a balance of confidentiality,<br>integrity, and availability. Confidentiality functions as privacy in the digital world by<br>establishing rules that limit access to sensitive data (Chai 2). Practices such as multi-factor<br>authentication and data encryption allow organizations to effectively secure sensitive<br>information. Integrity ensures that data remains accurate and trustworthy by protecting it<br>from being tampered with (Chai 4). Organizations implement access controls and<br>permissions to detect and prevent unauthorized changes to sensitive data (TechTarget).<br>Availability allows authorized personnel to have reliable access to systems and their data<br>when needed (Chai 4), supported by regular maintenance, system updates, and recovery<br>planning that minimize downtime (TechTarget). When these principles are treated as an<br>integrated system rather than separate concepts, organizations are better equipped to<br>maintain a secure environment. While authentication and authorization both support the<br>CIA Triad, they perform different roles in securing systems. Authentication is the process of<br>verifying a user\u2019s identity by answering the question, \u201cWho are you?\u201d For example, access to<br>the DFAS (Defense Finance and Accounting Service) portal requires service members to<br>authenticate using a Common Access Card (CAC) or a username and password.<br>Authorization follows authentication and determines what an authenticated user is<br>permitted to access by answering the question, \u201cWhat are you allowed to do?\u201d After logging in, a service member may be authorized to view pay statements, while only finance<br>personnel are authorized to manage pay records. Together, these concepts support effective<br>cybersecurity by ensuring secure, reliable, and appropriate access to information systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At its core, the CIA Triad serves as the foundational framework of cybersecurity by shapinghow organizations protect information systems through a balance of confidentiality,integrity, and availability. Confidentiality functions as privacy in the digital world byestablishing rules that limit access to sensitive data (Chai 2). Practices such as multi-factorauthentication and data encryption allow organizations to effectively&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/2026\/04\/19\/the-cia-triad-and-access-control-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":31921,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/222"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/users\/31921"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/comments?post=222"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/222\/revisions"}],"predecessor-version":[{"id":223,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/posts\/222\/revisions\/223"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/media?parent=222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/categories?post=222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mailanijjonesthornton\/wp-json\/wp\/v2\/tags?post=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}