{"id":286,"date":"2026-02-16T03:49:53","date_gmt":"2026-02-16T03:49:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/meganbeard\/?p=286"},"modified":"2026-02-16T03:49:53","modified_gmt":"2026-02-16T03:49:53","slug":"the-illustrations-of-the-cia-triad-and-authentication-vs-authorization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/meganbeard\/2026\/02\/16\/the-illustrations-of-the-cia-triad-and-authentication-vs-authorization\/","title":{"rendered":"The Illustrations of the CIA Triad and Authentication vs. Authorization"},"content":{"rendered":"\n<p>In this write-up, I first describe the CIA triad and how all three functioning parts work<\/p>\n\n\n\n<p>together best to help a security system run smoothly while being properly protected by ensuring<\/p>\n\n\n\n<p>who needs to have access does, the systems have safe and reliable forms of backup protection in<\/p>\n\n\n\n<p>case errors or attacks on the system happen, and how the systems keep the right information for<\/p>\n\n\n\n<p>the right person available at any time. I then differentiate authentication as confirming one\u2019s<\/p>\n\n\n\n<p>identity vs. authorization as someone being able to access the information they are permitted to<\/p>\n\n\n\n<p>view.<\/p>\n\n\n\n<p>The CIA Triad<\/p>\n\n\n\n<p>When a company, or being, needs to better learn how to protect its security systems and the<\/p>\n\n\n\n<p>valuable information that it protects, they need to look at the balance needed to create a clean and<\/p>\n\n\n\n<p>consistent foundation for their security. The triad is broken down into three main parts that all<\/p>\n\n\n\n<p>coincide with each other, which are confidentiality, integrity, and availability. All, if balanced<\/p>\n\n\n\n<p>properly, work hand in hand with each other to ensure better safety for organizations. This<\/p>\n\n\n\n<p>module can be broken down into the simple idea that most organizations have certaininformation contained in their files that should only be accessed by those who need it and should<\/p>\n\n\n\n<p>have access to it, which is described through the confidentiality part of the triad. It is then broken<\/p>\n\n\n\n<p>down by the integrity side into the systems that protect all of that same information and how, if<\/p>\n\n\n\n<p>left accessible to the wrong person or a fault in the security system, the organization would be<\/p>\n\n\n\n<p>distraught. Finally, the availability side is seen as how accessible the information or data is to the<\/p>\n\n\n\n<p>people who need to view it. The systems that keep this running smooth are in place to ensure it is<\/p>\n\n\n\n<p>timely and effective at getting information kept organized and readily available to those needing<\/p>\n\n\n\n<p>to access it.<\/p>\n\n\n\n<p>Authentication vs. Authorization<\/p>\n\n\n\n<p>Authentication is the act of a system confirming who is accessing the content or<\/p>\n\n\n\n<p>information requested, while authorization can be defined as the confirmation that the right<\/p>\n\n\n\n<p>person is able to access their specific permitted data or information.<\/p>\n\n\n\n<p>Authorization examples could include the face ID on most devices nowadays, the<\/p>\n\n\n\n<p>usernames that are created specific to you, and even the use of a valid ID in required places. On<\/p>\n\n\n\n<p>the other hand, authorization would have examples as simple as who you give access to view or<\/p>\n\n\n\n<p>edit a document, managers deciding who gets access to the companies\u2019 asset information, or who<\/p>\n\n\n\n<p>can change settings on your home alarm system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this write-up, I first describe the CIA triad and how all three functioning parts work together best to help a security system run smoothly while being properly protected by ensuring who needs to have access does, the systems have safe and reliable forms of backup protection in case errors or attacks on the system&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/meganbeard\/2026\/02\/16\/the-illustrations-of-the-cia-triad-and-authentication-vs-authorization\/\">Read More<\/a><\/div>\n","protected":false},"author":25641,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/posts\/286"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/users\/25641"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/posts\/286\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/posts\/286\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/media?parent=286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/categories?post=286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/meganbeard\/wp-json\/wp\/v2\/tags?post=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}