{"id":289,"date":"2025-04-07T00:04:10","date_gmt":"2025-04-07T00:04:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/?p=289"},"modified":"2025-04-07T00:43:25","modified_gmt":"2025-04-07T00:43:25","slug":"write-up-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/2025\/04\/07\/write-up-the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p><strong>CIA Triad<\/strong><br>                 Cybersecurity is a rather broad term, both in its definition and uses. However, at its core,<br>cybersecurity is the practice of protecting systems, networks, and data. With the vast<br>development of technology and the growing number of individuals with access to the internet,<br>cybersecurity proves its importance in keeping users protected. There are key principles and<br>practices that ensure not only the safety of data but also the proper control over who can access it<br>and what they can do with said data.<br><\/p>\n\n\n\n<p>These key domains of cybersecurity are known as confidentiality, integrity and<br>availability. Also known as the CIA triad, this model makes up the foundation of cybersecurity.<br>Confidentiality in short, limits access to information, integrity maintains the quality and<br>trustworthiness of data, and availability is the promise of consistent access to information by<br>authorized users (Chai, 2022, pg.1).<\/p>\n\n\n\n<p><strong>Confidentiality<\/strong><br><\/p>\n\n\n\n<p>Confidentiality is a guarantee that data remains private. For this to be possible,<br>accessibility is only given to authorized personnel. Data is often classified by how sensitive<br>and\/or vulnerable it is, which allows for the proper protocol to be utilized. Some of these<br>protocols include data encryption, two factor authentication or even employee training. An<br>example of this would be a banker having access to a client&#8217;s information after being given the<br>proper authorization. Unlike the banker, no other employees would be able to access or see this<br>data.<\/p>\n\n\n\n<p><strong>Integrity<\/strong><\/p>\n\n\n\n<p>Integrity ensures that all data maintains consistency, accuracy and trustworthiness, while<br>also guaranteeing the ability to transfer data without it being altered or stolen. (Chai, 2022, pg.2)<br>For example, part of a hospital&#8217;s duty is maintaining the integrity of a patient&#8217;s data. Which is<br>achieved by limiting the number of personnel which hold the ability to alter and\/or access<br>medical records. Integrity relies on all data being authentic, accurate and reliable.<br><\/p>\n\n\n\n<p><strong>Availability<\/strong><br><\/p>\n\n\n\n<p>Availability keeps all data accessible for all authorized individuals. Maintaining systems,<br>protocol and hardware needed for access is critical. The use of data backups, backup power in<br>the case of blackouts or EMP, general maintenance to all systems which contain data ensure<br>availability to all users. Cloud backups are often used to maintain availability when individuals<br>or businesses want to switch devices or networks.<br><\/p>\n\n\n\n<p><strong>Authentication &amp; Authorization<\/strong><br><\/p>\n\n\n\n<p>The use of authentication and authorization play a vital role in ensuring that the CIA triad is<br>upheld, both tying directly into protocol utilized by the triad. It&#8217;s important to understand the<br>distinction between the two concepts. Authentication verifies the identity of the user to ensure<br>confidentiality by making sure that only authorized users have access to data. Authorization<br>defines what an authenticated user can do, it can protect integrity by preventing unauthorized<br>changes to data, and also helps ensure availability by controlling access and preventing misuse<br>from unauthorized users.<br><\/p>\n\n\n\n<p><strong>Final Thoughts<\/strong><br><\/p>\n\n\n\n<p>With the need for cybersecurity growing by the minute, it&#8217;s important to understand the<br>fundamental concepts that define cybersecurity. The CIA triad provides the guidelines needed in order to ensure data remains safe. It presents itself as more than just a guideline, but as a path to<br>continue to develop new cybersecurity protocol and procedures.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>References and Citations<\/strong><\/p>\n\n\n\n<p>References<br>https:\/\/www.geeksforgeeks.org\/difference-between-authentication-and-authorization\/ <br>https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CIA Triad Cybersecurity is a rather broad term, both in its definition and uses. However, at its core,cybersecurity is the practice of protecting systems, networks, and data. With the vastdevelopment of technology and the growing number of individuals with access to the internet,cybersecurity proves its importance in keeping users protected. There are key principles andpractices &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/mehmetcuce\/2025\/04\/07\/write-up-the-cia-triad\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The CIA Triad<\/span><\/a><\/p>\n","protected":false},"author":30592,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/posts\/289"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/users\/30592"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/comments?post=289"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/posts\/289\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/posts\/289\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/media?parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/categories?post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mehmetcuce\/wp-json\/wp\/v2\/tags?post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}