{"id":295,"date":"2023-02-03T18:50:39","date_gmt":"2023-02-03T18:50:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/?p=295"},"modified":"2023-02-03T19:06:44","modified_gmt":"2023-02-03T19:06:44","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/2023\/02\/03\/the-cia-triad\/","title":{"rendered":"CYSE 200T &#8211; The CIA Triad Write Up"},"content":{"rendered":"\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\"><em>The CIA Triad is the foundation of information security. It provides us with the 3 building blocks of what good security means. Without the CIA Triad model, security today would not be where it\u2019s at right now. However, the CIA Triad does need to be updated because, with technology and attacks changing daily, the CIA Triad will soon be vulnerable and will not be relied upon anymore.<\/em><br><\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\"><strong>What is the CIA Triad?<\/strong><br>The CIA Triad, not to be confused with the Central Intelligence Agency, is a security model that consists of three components: confidentiality, integrity, and availability. Confidentiality means the protection of information from unauthorized disclosure. Integrity means the protection of information from unauthorized modification. Availability means the ability of authorized users to access information when needed. The three components of the CIA triad form the foundation of information security.<br><\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\"><strong>What is Authentication?<\/strong><br>According to (Authentication &#8211; glossary: CSRC 2023), authentication means \u201cVerifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.\u201d In simpler terms, it means that you need to have the right credentials to have permission to an application or device. As an example, you go to unlock your iPhone, but it needs to scan your face or fingerprint. That is authentication and without it, all our data would be at a loss.<br><\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\"><strong>What is Authorization?<\/strong><br>According to (Security authorization &#8211; glossary: CSRC 2023), authorization means \u201cThe right or a permission that is granted to a system entity to access a system resource.\u201d This is the next step after authentication to access your information. If your authentication fails, then authorization will not happen.<br><\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\"><strong>Differences between Authentication and Authorization<\/strong><br>The key difference between authentication and authorization is that one is a verifier, and the other either denies or grants access. Authentication happens before authorization. During authentication, the device or application will need to verify the person logging in is who they are. Next, authorization occurs and most of the time access will always be granted if authentication passes. However, if authentication fails then authorization will not happen.<br><\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\"><strong>Conclusion<\/strong><br>In conclusion, the CIA Triad is a very important building block to the foundation of IT and cybersecurity. Without it, organizations would be losing thousands of pieces of data every day because there would be no confidentiality, integrity, or availability when it comes to the protection of data. However, it does need to be updated so it can continue to be relied upon as the key factor to security in IT. Along with the CIA Triad being important for cybersecurity, authentication and authorization can not be forgotten as well. Without these two necessities, data leaks would be another problem for organizations and personal devices.<br><\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\"><strong>References<\/strong><br>Chai, W. (2022, June 28). What is the CIA triad? definition, explanation, examples &#8211; TechTarget. WhatIs.com. Retrieved January 24, 2023, from https:\/\/www.techtarget.com \/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<br>Editor, C. S. R. C. C. (n.d.). Authentication &#8211; glossary: CSRC. CSRC Content Editor. Retrieved January 24, 2023, from https:\/\/csrc.nist.gov\/glossary\/term\/authentication<br>#:~:text=Definitions%3A,resources%20in%20an%20information%20system.<br>Editor, C. S. R. C. C. (n.d.). Security authorization &#8211; glossary: CSRC. CSRC Content Editor. Retrieved January 24, 2023, from https:\/\/csrc.nist.gov\/glossary\/term\/<br>security_authorization#:~:text=The%20right%20or%20a%20<br>permission,to%20access%20a%20system%20resource.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is the foundation of information security. It provides us with the 3 building blocks of what good security means. Without the CIA Triad model, security today would not be where it\u2019s at right now. However, the CIA Triad does need to be updated because, with technology and attacks changing daily, the CIA&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/2023\/02\/03\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":25798,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/users\/25798"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":320,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/posts\/295\/revisions\/320"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}