{"id":304,"date":"2024-12-04T01:20:59","date_gmt":"2024-12-04T01:20:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/?p=304"},"modified":"2024-12-04T01:23:34","modified_gmt":"2024-12-04T01:23:34","slug":"it-cyse-200t","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/2024\/12\/04\/it-cyse-200t\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>On this page,&nbsp;I am going to describe the CIA Triad&nbsp;and the differences between<br>Authentication &amp; Authorization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CIA Triad<\/strong><\/h2>\n\n\n\n<p>There are&nbsp;many ways&nbsp;to explain the CIA Triad but the best way I would explain it would&nbsp;be&nbsp;the three fundamental concepts that together are commonly referred to as the CIA triad and&nbsp;affect information security policy for any organization are confidentiality, integrity, and&nbsp;availability. The CIA triad serves as a cornerstone to information security, ensuring that&nbsp;concentration is made on three important principles. Confidentiality ensures that sensitive&nbsp;information is only accessed by the properly authenticated user or application. This occurs&nbsp;through encryption and access controls. Integrity: Data integrity makes sure that the data can be held in its most accurate and comprehensive form without being tampered with either&nbsp;maliciously or unauthorized. Some techniques used include&nbsp;hashing and data validation&nbsp;techniques that ensure data integrity. Availability: It involves ensuring access to information and resources is provided to authorized users when needed, and hence disruption and downtime are&nbsp;prevented. Typically, redundancy,&nbsp;failover systems, and regular maintenance give support to&nbsp;availability. All these together can allow a robust security posture by protecting data against unauthorized access, ascertaining accuracy, and keeping the data accessible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The differences between Authentication &amp; Authorization<\/h2>\n\n\n\n<p>Many people confuse these 2 terms&nbsp;but&nbsp;in&nbsp;brief and short terms, authentication is the process of verifying who a user is,&nbsp;whereas&nbsp;authorization is the process of verifying what they have access to.&nbsp;Now diving deeper into these 2 terms&nbsp;to&nbsp;begin, Authentication: Authentication is the process of verifying if an end user or system is who they say they are. This is usually performed via passwords, biometric scans, or security tokens. It answers the question &#8220;Who are you?&#8221; to assure that the person or entity is truly who they purport to be.&nbsp;The easiest example for this would be&nbsp;comparable to when you place your finger on the scanner, it would compare that fingerprint with the data of fingerprints within the device. If it matches, then the phone authenticates your identity, therefore allowing access to the device.&nbsp;On the other hand, authorization is the process of&nbsp;establishing&nbsp;what an authenticated user or system is allowed to do: which resources it can access and which actions it can perform. It answers back to &#8220;What are you allowed to do?&#8221; through permissions and levels of access. Authentication is coming first and is going to make sure that an entity is recognized, and on its tail comes authorization, either to allow or restrict access based on policies set in advance. Both are considered&nbsp;very important&nbsp;in securing systems, but they handle different forms of security. Authentication&nbsp;identifies&nbsp;a person, while authorization handles access rights and permissions. The best example I could&nbsp;come up&nbsp;with&nbsp;would be an example of authorization including permission to files on a company&#8217;s network drive. First, you must authenticate yourself by logging in with your username and password, then the system checks your access rights. If your access is appropriately set, you will have permission to read,&nbsp;modify, and&nbsp;delete&nbsp;files according to your role-regular employees&nbsp;perhaps only&nbsp;having read access, while a manager has access to do anything.&nbsp;What the authorization can decide is what&nbsp;actions&nbsp;you are allowed to perform on the files or resources within that network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On this page,&nbsp;I am going to describe the CIA Triad&nbsp;and the differences betweenAuthentication &amp; Authorization. CIA Triad There are&nbsp;many ways&nbsp;to explain the CIA Triad but the best way I would explain it would&nbsp;be&nbsp;the three fundamental concepts that together are commonly referred to as the CIA triad and&nbsp;affect information security policy for any organization are confidentiality,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/maliyahhynson\/2024\/12\/04\/it-cyse-200t\/\">Read More<\/a><\/div>\n","protected":false},"author":29914,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/posts\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/users\/29914"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/posts\/304\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/posts\/304\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/media?parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/categories?post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/maliyahhynson\/wp-json\/wp\/v2\/tags?post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}