{"id":295,"date":"2024-04-22T00:11:41","date_gmt":"2024-04-22T00:11:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/?p=295"},"modified":"2024-04-22T00:13:24","modified_gmt":"2024-04-22T00:13:24","slug":"295","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/2024\/04\/22\/295\/","title":{"rendered":"The CIA triad write up."},"content":{"rendered":"\n<p>Breakdown of the CIA Triad<\/p>\n\n\n\n<p>The CIA Triad is a system made of 3 values that help keep important information in the<\/p>\n\n\n\n<p>group that uses this system. These values are composed of confidentiality, Integrity, and<\/p>\n\n\n\n<p>availability. Starting with confidentiality according to (Chai page 3) is privacy on your<\/p>\n\n\n\n<p>information or very important information and the measures set up to keep those things private.<\/p>\n\n\n\n<p>Integrity according to (Chai page 4) is upholding the quality, and trustworthiness of the data for<\/p>\n\n\n\n<p>the data lifecycle so no other outside source can tamper or mess with said data. Last is<\/p>\n\n\n\n<p>availability, availability around to (Chai page 4-5 ) is the fact that information should always be<\/p>\n\n\n\n<p>ready to access and whenever needed for any party that has the authority to access the data or<\/p>\n\n\n\n<p>information.<\/p>\n\n\n\n<p>differences between Authentication &amp; Authorization<\/p>\n\n\n\n<p>The difference between Authentication and authorization is that Authentication is the<\/p>\n\n\n\n<p>process of proving you are who you say you are, whereas authorization is checking to see if you<\/p>\n\n\n\n<p>have clearance or the authority to access something. An example of Authentication would be<\/p>\n\n\n\n<p>signing into an account and it asks you questions you answered before. An example of<\/p>\n\n\n\n<p>Authorization would be a government-issued key card you would use to sign in to government<\/p>\n\n\n\n<p>work computers.<\/p>\n\n\n\n<p>Conclusion of CIA Triad&nbsp;&nbsp;<\/p>\n\n\n\n<p>The CIA triad is a system that&#8217;s made up of three core parts: Confidentiality, Integrity, and Availability. The triad works by training employees and students about the importance of confidentiality, Integrity, and Availability. The importance of Confidentiality is to keep the privacy of valuable information and the measures needed to do so. The importance of Integrity is to uphold the quality and trustworthiness of data so no other outside sources can tamper with the data. The importance of Availability is keeping information ready for access at any time for anyone who has authorization to the data. The CIA triad is used in many companies and places, it helps bolster security and help train employees using the program.<\/p>\n\n\n\n<p>Work cited.<\/p>\n\n\n\n<p>Work cited <br>Chai, W. (2024, January 23). What is the CIA triad? definition, explanation, examples &#8211;<br>techtarget. Whatls.com. Retrieved September 15, 2022,<br>fromhttps:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?jr=<br>on<br>\u201cDifference between Authentication and Authorization.\u201d GeeksforGeeks, GeeksforGeeks,<br>22 Feb. 2023, www.geeksforgeeks.org\/difference-between-authentication-and-authorization\/.<\/p>\n\n\n\n<p> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Breakdown of the CIA Triad The CIA Triad is a system made of 3 values that help keep important information in the group that uses this system. These values are composed of confidentiality, Integrity, and availability. Starting with confidentiality according to (Chai page 3) is privacy on your information or very important information and the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/2024\/04\/22\/295\/\">Read More<\/a><\/div>\n","protected":false},"author":28612,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/users\/28612"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/posts\/295\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marcus-rushing-1\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}