{"id":282,"date":"2025-11-21T22:24:00","date_gmt":"2025-11-21T22:24:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/?p=282"},"modified":"2025-11-21T22:28:01","modified_gmt":"2025-11-21T22:28:01","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/2025\/11\/21\/the-cia-triad\/","title":{"rendered":"The CIA triad"},"content":{"rendered":"\n<p>Michelle Corcoran\u00a0<\/p>\n\n\n\n<p>9\/17\/25<\/p>\n\n\n\n<p><em>The CIA triad secures data through confidentiality, integrity, and availability. Authentication is the process of verifying identity while authorization grants access. Together, they protect information from unauthorized access.<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">The CIA triad&nbsp;<\/h1>\n\n\n\n<p>The CIA triad stands for \u201cConfidentiality, Integrity, and Availability.\u201d This is a model that would be referred to as common and stands as the base of developing security systems (\u201cWhat is CIA triad\u201d, n.d.). Going more into depth on the individual parts that make up the acronym CIA, confidentiality refers to the concept of an organization ensuring that their data is protected and kept secret or confidential. One aspect of this would be people who should have access to something like important information being able to do so without people who are not authorized being able to see such information (\u201cWhat is CIA triad\u201d, n.d.). When it comes to integrity, this refers to data&#8217;s accuracy and trustworthiness remaining the same without unauthorized people changing it (Hashemi-pour &amp; Chai, 2023). As for availability, this refers to data and information remaining able to be accessed by those who should have that authority. To best practice this concept within an organization, \u201caccess control lists and other file permissions [should be kept] up to date\u2026 employees [should be] knowledgeable about compliance and regulatory requirements to minimize human error\u2026[and the company should] Use preventive measures such as redundancy, failover and RAID. (Hashemi-pour &amp; Chai, 2023). Through implementing the CIA triad, companies can keep track of what hackers could be targeting and help to use the proper methods to ensure the assets are protected.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Authentication vs. Authorization&nbsp;<\/h1>\n\n\n\n<p>Authentication is the process of someone&#8217;s identity being confirmed and exists as what&#8217;s typically the first step within a security process (\u201cAuthentication vs authorization\u201d, n.d.). In order for an identity to be confirmed, someone would need to show some sort of evidence, whether physical or not, to an authentication platform&nbsp; (\u201cAuthentication vs authorization\u201d, n.d.). Some examples of this could be a password, which is non-physical, a key, and something like a face scan. As for authorization, this would be giving someone permission to access either a location or a resource containing information such as a website. The difference between these two terms is that authentication has to come before authorization in order for someone to be able to be given access. Otherwise, the information or place would be unprotected and anyone could access it. An example of both would be someone using a password to get into an account, which would authenticate that they are allowed to have access to the account, followed by them being abe to get into said account after being authenticated.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>In conclusion, the CIA triad is essential for building a strong security foundation and ensuring that data remains confidential, accurate, and accessible to authorized users. By applying these principles, organizations can better protect their information from threats. Though sometimes confused, authentication confirms identity while authorization grants access.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<p>Authentication vs authorization: Key differences. (n.d.-a). Retrieved from https:\/\/www.fortinet.com\/resources\/cyberglossary\/authentication-vs-authorization&nbsp;<\/p>\n\n\n\n<p>Hashemi-Pour, C., &amp; Chai, W. (2023). What is the CIA triad?: Definition from TechTarget. Retrieved from https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?jr=on&nbsp;<\/p>\n\n\n\n<p><em>What is the CIA triad and why is it important? (n.d.). Retrieved from https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad&nbsp;<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Michelle Corcoran\u00a0 9\/17\/25 The CIA triad secures data through confidentiality, integrity, and availability. Authentication is the process of verifying identity while authorization grants access. Together, they protect information from unauthorized access. The CIA triad&nbsp; The CIA triad stands for \u201cConfidentiality, Integrity, and Availability.\u201d This is a model that would be referred to as common and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/michellecorcoran\/2025\/11\/21\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31243,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/users\/31243"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/posts\/282\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michellecorcoran\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}