{"id":298,"date":"2024-11-17T20:27:11","date_gmt":"2024-11-17T20:27:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/matt-surratt\/?p=298"},"modified":"2024-11-17T20:27:11","modified_gmt":"2024-11-17T20:27:11","slug":"cia-triad-the-shield-for-data","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/matt-surratt\/2024\/11\/17\/cia-triad-the-shield-for-data\/","title":{"rendered":"CIA Triad, the Shield for Data"},"content":{"rendered":"\n<p class=\"has-text-align-left\"><br>CIA Triad, the Shield for Data<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>The CIA triad is confidentiality, integrity, and availability; the three characteristics of cybersecurity that professionals rely on to ensure the safety of data. Data safety is dependent upon both authentication, the verification of a user\u2019s identity, and authorization, what the user can do with that data. In this write-up, I will first describe confidentiality and authentication. Then, I will move to integrity and authorization. Finally, I will describe availability and its importance.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Confidentiality<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br> Confidentiality as part of the CIA triad means the steps that are taken to protect data from unauthenticated access. Examples of these steps involve the use of strong passwords, two-factor authentication, and data encryption. Authentication is a major part of confidentiality. \u201cConsider the following simplified example of a hotel reservation. When you arrive at the hotel, the front desk clerk requests your ID to verify your reservation. Your ID authenticates you to the hotel. The front desk clerk gives you a hotel key\u201d (Learn about Authentication and Authorization | Google Workspace, n.d.)   <\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Integrity<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br> Integrity pertaining to the CIA triad means that steps are taken to prevent unauthorized access, and that the data is not compromised and retains accuracy.  Examples of integrity include file permissions, user access, and the prevention of accidental deletion of data. Authorization of specific users to access specific files falls under integrity. Just like the key the hotel clerk gave you after your ID had been authenticated, \u201cthis key gives you access to certain resources at the hotel such as your hotel room, the gym, and the business center. The hotel key authorizes you to access those resources\u201d (Learn about Authentication and Authorization | Google Workspace, n.d.).<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Availability<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Availability is ensuring that access to data is available to those who have permission.  The focus of availability is ensuring that the data is available when it is needed. This covers every aspect of connectivity, backing up, software, and hardware maintenance. Anything that could make the data unavailable when it is needed falls under availability.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Conclusion<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Finally, the CIA triad is like a shield that protects data. Confidentiality, integrity, and availability are the three characteristics that make it successful.  When implemented and maintained, the CIA triad is a proven set of tactics for preventing cyber-attacks. Authentication is the verification of the user\u2019s identity through means like password protection, two factor authentication, and biometric verification. Authorization is what data the user has access to once their identity has been verified. Overall, the CIA triad is designed to be flexible to fit the protective needs of various implementations and with upkeep and maintenance is proven successful.<br><br>References<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Learn about authentication and authorization | Google Workspace. (n.d.). Google for Developers. Retrieved September 15, 2024, from https:\/\/developers.google.com\/workspace\/guides\/auth-overview<br><br><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CIA Triad, the Shield for Data The CIA triad is confidentiality, integrity, and availability; the three characteristics of cybersecurity that professionals rely on to ensure the safety of data. Data safety is dependent upon both authentication, the verification of a user\u2019s identity, and authorization, what the user can do with that data. In this write-up,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/matt-surratt\/2024\/11\/17\/cia-triad-the-shield-for-data\/\">Read More<\/a><\/div>\n","protected":false},"author":29497,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5,1],"tags":[3,4],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/posts\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/users\/29497"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/posts\/298\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matt-surratt\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}