{"id":293,"date":"2024-11-13T18:34:41","date_gmt":"2024-11-13T18:34:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/?p=293"},"modified":"2024-11-13T18:34:41","modified_gmt":"2024-11-13T18:34:41","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/2024\/11\/13\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>In the field of cybersecurity, you can find the CIA Triad. It consists of Confidentiality, Integrity, and Availability, serving as a foundation for protecting information and maintaining data security protocols. The three elements within this triad are dedicated to facets of preserving data security and ease of access.&nbsp;<\/p>\n\n\n\n<p><strong>Confidentiality<\/strong><\/p>\n\n\n\n<p>Keeping information confidential is crucial for protecting the privacy and security of data by limiting access to authorized individuals. This is especially important in scenarios like banking, where encryption methods are utilized to ensure that only the account holder and the bank can view financial information and prevent unauthorized access to sensitive data.&nbsp;<\/p>\n\n\n\n<p><strong>Integrity<\/strong><\/p>\n\n\n\n<p>Ensuring honesty is essential to maintain the accuracy and reliability of data over time. This fundamental principle ensures the stability and logical sequence of data, from its creation to any modifications, guaranteeing its trustworthiness. In fields such as software development, maintaining honesty involves using version control systems and performing data validation checks. These procedures prevent unauthorized modifications and maintain the reliability of the data.<\/p>\n\n\n\n<p><strong>Availability<\/strong><\/p>\n\n\n\n<p>Ensuring data availability is crucial for allowing authorized users to access information without interruption consistently. It involves implementing strategies like creating data backups, regularly maintaining hardware equipment, and having contingency plans in place to minimize any disruptions. For example, cloud storage platforms provide copies of data. They perform routine backups to guarantee that data accessibility persists even during technical failures.&nbsp;<\/p>\n\n\n\n<p><strong>Authentication v. Authorization<\/strong><\/p>\n\n\n\n<p>Understanding the CIA Triad is essential in information security, alongside grasping the significance of authentication and authorization processes. Authentication focuses on confirming the identity of a user or system, while authorization outlines the specific actions that authenticated users can carry out within a given system or network setting. It&#8217;s vital to differentiate between these concepts to uphold data security and integrity by granting access to authorized individuals while thwarting entry attempts.&nbsp;<\/p>\n\n\n\n<p><strong>Authentication<\/strong><\/p>\n\n\n\n<p>Authentication involves confirming the identity of a person or system to make sure they are who they say they are before allowing entry. In a scenario like an email setup, when a staff member signs in to their account, the system confirms who they are by verifying their password and entering a code sent to their phone for one-time use. After confirming the identity, the system grants permissions based on the employee\u2019s position within the organization. Authentication is important to maintain the security and accuracy of data by allowing access to approved individuals while preventing unauthenticated users from gaining entry.&nbsp;<\/p>\n\n\n\n<p><strong>Authorization<\/strong><\/p>\n\n\n\n<p>In terms of authorization duties, on a system or network platform, it is crucial to clearly define the activities that a recognized user can securely and responsibly perform. This includes setting up and enforcing permissions and access rights according to the user\u2019s position and entitlement level within the organization or network environment itself. In a business setting, like a company\u2019s internal network setup, an employee\u2019s ability to view files or use applications is limited by their designated role in the company hierarchy. For instance, a supervisor might be able to access confidential financial data, while a regular employee may not have that authorization, ensuring that access is in line with each person\u2019s job responsibilities.&nbsp;<\/p>\n\n\n\n<p><strong>Summary<\/strong><\/p>\n\n\n\n<p>In summary, the CIA Triade, Confidentiality, Integrity, and Availability, offers a structure for dealing with the elements of information security. Grasping and putting into practice these concepts, along with overseeing user authentication and authorization procedures, is essential to protecting information from risks and guaranteeing that data stays safe and reachable solely to individuals with the necessary authorization.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Chai, Wesley. &#8220;What Is the CIA Triad? Definition, Explanation, Examples.&#8221;&nbsp;<em>TechTarget<\/em>, 28 June 2022.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In the field of cybersecurity, you can find the CIA Triad. It consists of Confidentiality, Integrity, and Availability, serving as a foundation for protecting information and maintaining data security protocols. The three elements within this triad are dedicated to facets of preserving data security and ease of access.&nbsp; Confidentiality Keeping information confidential is crucial&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/2024\/11\/13\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":29377,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/users\/29377"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/posts\/293\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikeisha-robinson\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}