{"id":305,"date":"2022-12-04T23:21:04","date_gmt":"2022-12-04T23:21:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicoleselo\/?p=305"},"modified":"2022-12-04T23:21:15","modified_gmt":"2022-12-04T23:21:15","slug":"write-up-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nicoleselo\/2022\/12\/04\/write-up-the-cia-triad\/","title":{"rendered":"Write-Up: The CIA Triad"},"content":{"rendered":"\n<p>Nicole Selo-Ojeme<br>CYSE 200T<br>09-17-22<br>Prof. Kirkpatrick<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Write-Up: The CIA Triad<\/p>\n\n\n\n<p><br>The CIA triad, generally known as confidentiality, integrity, and availability, is a concept<br>created to direct information security policies inside an organization. To avoid confusion with the<br>Central Intelligence Agency, the concept is sometimes commonly referred to as the AIC triad<br>(availability, integrity, and confidentiality). Confidentiality is intended to protect against<br>unauthorized access to sensitive data. Privacy and confidentiality are essentially identical<br>concepts. Integrity is the management of data throughout its full lifecycle in terms of<br>consistency, accuracy, and dependability. Availability means information should always be<br>regularly and easily available to authorized persons.<br><\/p>\n\n\n\n<p>with regard to Another popular technique for maintaining confidentiality is data<br>encryption. User IDs and passwords are common practice. Utilizing such a method is considered<br>authentication. It occurs when a user needs to confirm their identity in order to access data. The<br>security procedure known as authorization establishes a user&#8217;s or service&#8217;s level of access. In<br>technology, authorization is used to grant users or services permission to access certain data or<br>carry out specific tasks.<\/p>\n\n\n\n<p>Rebecca is only permitted to ring up and check out orders because she is a cashier. On the<br>other hand, Kelanhi might also have access to the day&#8217;s final sales in her position as manager.<br>The system would use each user&#8217;s confirmed identification to provide them with specific access<br>because Rebecca and Kelanhi had distinct occupations at the convenience shop. Before granting<br>access, authentication confirms the user Kelanhi, and authorization establishes what they are<br>permitted to do after access has been granted.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Resources<\/strong><\/p>\n\n\n\n<p>https:\/\/www.onelogin.com\/learn\/authentication-vs-authorization#:~:text=Authentication%20and<br>%20authorization%20are%20two,authorization%20determines%20their%20access%20rights.<\/p>\n\n\n\n<p><br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?jr=o<br>n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nicole Selo-OjemeCYSE 200T09-17-22Prof. Kirkpatrick Write-Up: The CIA Triad The CIA triad, generally known as confidentiality, integrity, and availability, is a conceptcreated to direct information security policies inside an organization. To avoid confusion with theCentral Intelligence Agency, the concept is sometimes commonly referred to as the AIC triad(availability, integrity, and confidentiality). Confidentiality is intended to protect&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicoleselo\/2022\/12\/04\/write-up-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":20434,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/posts\/305"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/users\/20434"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/posts\/305\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/posts\/305\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/media?parent=305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/categories?post=305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicoleselo\/wp-json\/wp\/v2\/tags?post=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}