{"id":282,"date":"2026-02-22T20:32:24","date_gmt":"2026-02-22T20:32:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholascline\/?p=282"},"modified":"2026-02-22T20:32:24","modified_gmt":"2026-02-22T20:32:24","slug":"cia-triad-write-up","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nicholascline\/2026\/02\/22\/cia-triad-write-up\/","title":{"rendered":"CIA Triad Write up"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Nick Cline<br>February 17th, 2026<br>CYSE 200T<br>Professor Duvall<br>The CIA Triad<br> Bluf: The CIA triad is a crucial piece in the field of cybersecurity, without it company\u2019s would lose millions        of dollars and data.<br>Confidentiality<br> The CIA triad consists of three main components, the first being confidentiality. This is what monitors who has access to the data, turning away anyone who does not have the proper credentials. Forms of this are encryption keys, multi-factor authentication, and basic passwords.<br>Integrity<br> Integrity is what protects the data during its transfer, keeping the data intact and unchanged. It is also responsible for confirming the data of from a trustworthy source and has not been infected with any malicious programming.<br>Availability <br> Availability makes it possible for users with the proper credentials to access their data instantly. It makes sure the data can always be accsessed, through backup, maintaining hardware and software, and protected from attacks.<br>Authentication Vs Authorization<br> Authentication confirms who the user is, through fingerprint scanning, passwords, and MFA. This allows a user into a system, but it does not grant access to any data. Authorization checks the user&#8217;s permission the moment they are authenticated, and grants access to only the data they are authorized to access.<br>Conclusion<br> The CIA triad is a vital component in cybersecurity, and it must be well known and followed to properly progress in the field. If one aspect is out of line it could cost not only you, but your customers and company millions of dollars.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nick ClineFebruary 17th, 2026CYSE 200TProfessor DuvallThe CIA Triad Bluf: The CIA triad is a crucial piece in the field of cybersecurity, without it company\u2019s would lose millions of dollars and data.Confidentiality The CIA triad consists of three main components, the first being confidentiality. This is what monitors who has access to the data, turning away&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholascline\/2026\/02\/22\/cia-triad-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":32191,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/users\/32191"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/posts\/282\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascline\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}