{"id":207,"date":"2023-08-26T06:01:53","date_gmt":"2023-08-26T06:01:53","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2025-10-11T00:08:48","modified_gmt":"2025-10-11T00:08:48","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/phil-355e\/","title":{"rendered":"CIA Triad Evaluation"},"content":{"rendered":"\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-content\/uploads\/sites\/33778\/2025\/10\/pexels-energepic-com-27411-159888-1-1024x768.jpg\" alt=\"\" class=\"wp-image-641\" style=\"width:488px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-content\/uploads\/sites\/33778\/2025\/10\/pexels-energepic-com-27411-159888-1-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-content\/uploads\/sites\/33778\/2025\/10\/pexels-energepic-com-27411-159888-1-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-content\/uploads\/sites\/33778\/2025\/10\/pexels-energepic-com-27411-159888-1-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-content\/uploads\/sites\/33778\/2025\/10\/pexels-energepic-com-27411-159888-1-1536x1152.jpg 1536w, https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-content\/uploads\/sites\/33778\/2025\/10\/pexels-energepic-com-27411-159888-1-2048x1536.jpg 2048w, https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-content\/uploads\/sites\/33778\/2025\/10\/pexels-energepic-com-27411-159888-1-400x300.jpg 400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p>The CIA triad is the foundation of information security. This project showcases the ability to examine a foundational component of information security and objectively analyze it based on its current standing. <br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>What is the CIA Triad?<br> The CIA triad is a model used in cyber security to guide security measures. The name is an acronym for its component\u2019s, confidentiality, integrity, and availability. Confidentiality keeps sensitive information a secret from those that should not be able to access it (\u201cWhat Is the CIA Triad? Definition, Explanation, Examples: TechTarget.\u201d, 2023). Integrity means that the data is accurate, reliable and should be free of being tampered with. Availability allows internal access to those that are authorized to view\/manage it. <\/p>\n\n\n\n<p>The CIA Triad Strengths:<br>\nThe CIA Triad is a useful cyber security practice in many ways. At the core of its principle, confidentiality, integrity and availability are considered the three most important concepts in information technology (\u201cWhat Is the CIA Triad? Definition, Explanation, Examples: TechTarget.\u201d, 2023). Confidentiality requests the authentication of its users, which simple terms, means verifying who a person is (What is the difference between authentication and authorization? 2023). This can be accomplished by encryption, 2 factor authentication, user IDs, passwords, biometric authentication, etc. (\u201cWhat Is the CIA Triad? Definition, Explanation, Examples: TechTarget.\u201d, 2023). The verification of these credentials can grant users access to benefit services, retirement plans, job\/patient portals, etc. Integrity expands employee knowledge which minimizes human errors. In addition, tools such as access controls, data logs, and checksums are often used to help maintain consistency within the organization (\u201cWhat Is the CIA Triad? Definition, Explanation, Examples: TechTarget.\u201d, 2023). Availability of the CIA triad is only obtainable through authorization. Authorization grants or restricts access to individuals within an organization. Some things a user may be granted\/restricted access to include applications, files, data, documents etc. (What is the difference between authentication and authorization? 2023). Each component of the CIA Triad contributes very useful measures to an organization\u2019s overall security.<\/p>\n\n\n\n<p class=\"has-text-align-left\">The CIA Triad drawbacks:<br>\nThe CIA Triad is a very useful guideline for organizations; however, it is not flawless. There have been many technological advancements\/developments with no update to the CIA Triad, which poses major risks to the model\u2019s effectiveness. Since there are various devices that now interact with the internet that are not just computers, these devices are often unpatched and can easily be exploited (\u201cWhat Is the CIA Triad? Definition, Explanation, Examples: TechTarget.\u201d, 2023). This topic has become even more complex over recent years with the development of AI (artificial intelligence) and how the CIA Triad is insufficient in monitoring such technologies. In addition, the CIA Triad lacks the ability to guide risk management decisions that other security measures such as the NIST framework have implemented. Many organizations and individuals have thought that the CIA Triad needs to be updated in order to be as efficient as other security practices. <\/p>\n\n\n\n<p class=\"has-text-align-left\">Conclusion:<br>The CIA Triad is used as a guide for cyber security measures. However, the lack of<br>updates in recent years has slightly decreased its effectiveness. The CIA Triad can still be a useful security measure, however, there should be additional security practices in place to protect the organization.<\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p>What is the difference between authentication and authorization? SailPoint. (2023, March 7). <a href=\"https:\/\/www.sailpoint.com\/identity-library\/difference-between-authentication-and-authorization\">https:\/\/www.sailpoint.com\/identity-library\/difference-between-authentication-and-authorization<\/a>.<\/p>\n\n\n\n<p>Chai, Wesley. \u201cWhat Is the CIA Triad? Definition, Explanation, Examples: TechTarget.\u201d WhatIs.Com, TechTarget, 10 Feb. 2023,<a href=\"https:\/\/www.techtarget.com\/whatis\/definition \/Confidentiality-integrity-and-availability-CIA.\"> https:\/\/www.techtarget.com\/whatis\/definition \/Confidentiality-integrity-and-availability-CIA<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA triad is the foundation of information security. This project showcases the ability to examine a foundational component of information security and objectively analyze it based on its current standing. What is the CIA Triad? The CIA triad is a model used in cyber security to guide security measures. The name is an acronym&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nickcarpenter\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":27159,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-json\/wp\/v2\/users\/27159"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":675,"href":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-json\/wp\/v2\/pages\/207\/revisions\/675"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nickcarpenter\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}