{"id":295,"date":"2025-02-24T03:24:21","date_gmt":"2025-02-24T03:24:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nickmayo\/?p=295"},"modified":"2025-02-24T03:24:21","modified_gmt":"2025-02-24T03:24:21","slug":"the-cia-triad-and-differences-of-authentication-authorization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nickmayo\/2025\/02\/24\/the-cia-triad-and-differences-of-authentication-authorization\/","title":{"rendered":"The CIA Triad and Differences of Authentication &amp; Authorization"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Knowing The CIA Triad<br>The CIA Triad is a model that consists of three principles which are interrelated being confidentiality, integrity, and availability. With confidentiality, this ensures that people that are authorized to view sensitive information are the only people able to access it. This makes it so the information is kept private and helps keep it secure. An example would be strict access controls to prevent unauthorized people from getting into sensitive data. Integrity makes it so the data or information is kept in its original form and remains accurate as well as consistent unless otherwise from authorized personnel. Some ways to make sure integrity is kept is to have digital signatures and version control to see unwanted changes. Finally, with availability,  we can ensure that information is accessible to certain users which are authorized with this principle (What Is the CIA Triad?, 2025).<br><br>Authentication VS Authorization<br> Even though these two processes are different, they work together very well. Authentication is known as the process of verifying a person or user\u2019s identity. It answers \u201cWho are you?\u201d with the methods of passwords, biometrics, or security tokens. An example would be logging into a website with a username and password which then identifies who you are. (Authentication Vs. Authorization &#8211; Identity Fundamentals, n.d.) With Authorization, once a person is identified (or logged in), this process determines what applications, actions, or resources you are available to access. For instance, if you log into the company\u2019s email system like (______@odu.edu) students have access to only themselves and their own emails, but teachers and administrators might have access to a bigger role. Or as a role in people be able to access certain rooms within a company (Authentication Vs. Authorization: What\u2019s the Difference?, n.d.).<br><br>Conclusion <br> In summary, these principles and processes provide a robust framework like the CIA Triad by including confidentiality, integrity, and availability. They lay the foundation of protecting sensitive information from unwanted people\/entities and ensuring that data remains accessible to the people who need it. By understanding and using both the CIA Triad and knowing the differences between Authentication and Authorization, companies and organizations can create a place where systems and data can remain in a safe and protected environment. <br><br><br><br>References<br><em>Authentication vs. Authorization &#8211; Identity Fundamentals.<\/em> (n.d.). Auth0. Retrieved February 23, 2025, from https:\/\/auth0.com\/docs\/get-started\/identity-fundamentals\/authentication-and-authorization<br><em>Authentication vs. Authorization: What\u2019s the Difference? <\/em>(n.d.). OneLogin. Retrieved February 23, 2025, from https:\/\/www.onelogin.com\/learn\/authentication-vs-authorization<br><em>What Is the CIA Triad? <\/em>(2025, February 6). Coursera. Retrieved February 23, 2025, from https:\/\/www.coursera.org\/articles\/cia-triad<br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Knowing The CIA TriadThe CIA Triad is a model that consists of three principles which are interrelated being confidentiality, integrity, and availability. With confidentiality, this ensures that people that are authorized to view sensitive information are the only people able to access it. This makes it so the information is kept private and helps keep&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nickmayo\/2025\/02\/24\/the-cia-triad-and-differences-of-authentication-authorization\/\">Read More<\/a><\/div>\n","protected":false},"author":30597,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/users\/30597"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/posts\/295\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nickmayo\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}