{"id":295,"date":"2025-04-28T03:14:34","date_gmt":"2025-04-28T03:14:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ncybersite\/?p=295"},"modified":"2025-04-28T03:14:34","modified_gmt":"2025-04-28T03:14:34","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ncybersite\/2025\/04\/28\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>BLUF: CIA Triad (Confidentiality, Integrity, and Availability) is among the most important<br>cybersecurity models for data security, accuracy, and usability. One needs to know these<br>concepts and the distinction between authentication and authorization to effectively<br>protect systems. There are three primary principles upon which the CIA Triad is based.<br>Confidentiality provides access to information by legitimate users and avoids illegitimate<br>disclosure by encryption, multi-factor authentication, and access controls (Chai, 2023).<br>Integrity ensures data to be correct and not changed except by a legitimate entity. Hashing,<br>digital signatures, and checksums are utilized by organizations for authentication. Banks<br>utilize hashing to safeguard monetary transactions from modifications. Availability<br>provides access to data to legitimate users as and when required. Redundancy, regular<br>backups, and regular updating must be employed by organizations to achieve system<br>reliability and maintain downtimes low so that availability can be achieved. In addition to<br>availability, strong access control like authentication and authorization protects<br>confidential information. Authentication and authorization are distinct procedures.<br>Authentication verifies the identity of a person based on such credentials as security<br>tokens, biometrics, or passwords (Chai, 2023). Authorization determines what is allowed<br>for the logged-in user depending on available resources. For example, when accessing the<br>business network, the employee would display a password or fingerprint for<br>authentication. But executives and human resource department members only have<br>authorization to use and modify payroll information so that it remains secret.<br>Conclusion<br>Organizational adoption of the CIA Triad, authentication, and authorization increases<br>security, reduces threats, and offers system reliability against a changing threat<br>environment. These are the pillars of information protection and ensuring cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF: CIA Triad (Confidentiality, Integrity, and Availability) is among the most importantcybersecurity models for data security, accuracy, and usability. One needs to know theseconcepts and the distinction between authentication and authorization to effectivelyprotect systems. There are three primary principles upon which the CIA Triad is based.Confidentiality provides access to information by legitimate users and avoids&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ncybersite\/2025\/04\/28\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":29935,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/users\/29935"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}