{"id":292,"date":"2024-11-15T02:55:37","date_gmt":"2024-11-15T02:55:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholascarter\/?page_id=292"},"modified":"2024-11-15T03:31:52","modified_gmt":"2024-11-15T03:31:52","slug":"cia-triad-write-up","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nicholascarter\/cia-triad-write-up\/","title":{"rendered":"CIA Triad Write Up"},"content":{"rendered":"\n<p>Nicholas Carter, 09\/15\/2024<\/p>\n\n\n\n<p>The CIA triad is a model that was made to help guide companies in protecting information. The CIA stands for confidentiality, integrity, and availability. Without having all three well put in place there is not a strong security for valuable information within a company.<\/p>\n\n\n\n<p><strong>Confidentiality<\/strong><\/p>\n\n\n\n<p>Confidentiality is defined as preserving authorized restrictions on access and disclosure. (Editor, <em>Confidentiality &#8211; glossary: CSRC<\/em>) This means that the information must be kept restricted to make sure it does not fall into the wrong hands.<\/p>\n\n\n\n<p><strong>Integrity<\/strong><\/p>\n\n\n\n<p>Integrity means that the data is always trustworthy and complete. (<em>Confidentiality, integrity, and availability: The CIA triad<\/em>) The explanation for this is that if the data is not kept accurate then it has no use for and may even harm the company. Which is why it is very important to keep the data from being altered.<\/p>\n\n\n\n<p><strong>Availability<\/strong><\/p>\n\n\n\n<p>Availability is the company having ongoing access to important information resources. (<em>Confidentiality, integrity, and availability: The CIA triad<\/em>) Without this then there is no way to safely access the information. Which can cause a company to not be able to operate. Availability also gives the company the ability to make sure the data has not been breached and is secure.<\/p>\n\n\n\n<p><strong>Authentication vs Authorization<\/strong><\/p>\n\n\n\n<p>Authentication is the process of verifying somebody\u2019s identity, while authorization is deciding exactly how much a user can access or do. A good example of authentication would be me having to go through 2FA to login to my computer. While authorization would be what privileges I have to access files or make changes on my computer.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>The CIA triad is important for establishing strong information security. By following the principles of confidentiality, integrity, and availability a company can have a solid foundation for protecting their information.<\/p>\n\n\n\n<p><strong>Citations<\/strong><\/p>\n\n\n\n<p><strong>Editor, C. C. (n.d.). <em>Confidentiality &#8211; glossary: CSRC<\/em>. CSRC Content Editor. https:\/\/csrc.nist.gov\/glossary\/term\/confidentiality#:~:text=The%20term%20\u2019confidentiality\u2019%20means%20preserving,personal%20privacy%20and%20proprietary%20information.<\/strong><\/p>\n\n\n\n<p><strong><em>Confidentiality, integrity, and availability: The CIA triad<\/em>. Office of Information Security. (n.d.). https:\/\/informationsecurity.wustl.edu\/items\/confidentiality-integrity-and-availability-the-cia-triad\/<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nicholas Carter, 09\/15\/2024 The CIA triad is a model that was made to help guide companies in protecting information. The CIA stands for confidentiality, integrity, and availability. Without having all three well put in place there is not a strong security for valuable information within a company. Confidentiality Confidentiality is defined as preserving authorized restrictions&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholascarter\/cia-triad-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":29694,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/users\/29694"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/292\/revisions"}],"predecessor-version":[{"id":309,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/292\/revisions\/309"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/media?parent=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}