{"id":344,"date":"2025-02-20T03:00:27","date_gmt":"2025-02-20T03:00:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nikoletobin\/?p=344"},"modified":"2025-02-20T03:00:27","modified_gmt":"2025-02-20T03:00:27","slug":"cia-triad-overview","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nikoletobin\/2025\/02\/20\/cia-triad-overview\/","title":{"rendered":"CIA Triad Overview"},"content":{"rendered":"\n<p class=\"has-text-align-left\"><strong>The CIA Triad stands for Confidentiality, Integrity, and Availability. These three principles<br>help protect data in a secure system:<\/strong><br>1.<strong> Confidentiality<\/strong><br>Confidentiality means keeping information private and only accessible to people<br>who have permission. For example, an online store keeps customer credit card<br>details secret, and only the person who owns the card should be able to see the<br>information.<br>2. <strong>Integrity<\/strong><br>Integrity ensures that data stays accurate and hasn\u2019t been changed by anyone who<br>shouldn\u2019t have access. For example, when someone makes an online purchase, the<br>transaction data should not be tampered with. If the data was changed, it could<br>cause problems or lead to fraud.<br>3. <strong>Availability<\/strong><br>Availability means making sure that data and systems are always ready to be used<br>when needed. For example, if a business\u2019s website crashes during a big sale,<br>customers can\u2019t make purchases. To keep things running smoothly, businesses use<br>backups and regular system maintenance to make sure they stay available.<br><strong>Authentication vs. Authorization<\/strong><br>Although both authentication and authorization are important, they are different steps in<br>securing a system:<br>\u2022 <strong>Authentication<\/strong><br>Authentication is the process of proving who you are. It\u2019s like showing ID when you<br>enter a building. This can be done through something you know (like a password),<br>something you have (like a phone), or something about you (like a fingerprint). For<br>example, when you log into your email with a username and password, you\u2019re<br>authenticating yourself.<br>\u2022<strong> Authorization<br><\/strong>Authorization happens after authentication. Once the system knows who you are, it<br>checks what you\u2019re allowed to do. For example, you might log into a company\u2019s<br>system, but depending on your job role, you may only be able to access certain<br>files. This is authorization \u2014 it controls what you can see and do after you&#8217;re<br>authenticated.<br><strong>Example of Authentication and Authorization<\/strong><br>Let\u2019s say you\u2019re logging into an online banking system:<br>1. Authentication: When you enter your username and password, the system checks if<br>the details match with their records. This is authentication \u2014 confirming who you<br>are.<br>2. Authorization: After you&#8217;re authenticated, the system checks what actions you can<br>take. If you\u2019re a regular user, you might only be able to check your balance. But if<br>you&#8217;re a bank admin, you might have access to more sensitive data. This is<br>authorization \u2014 controlling what you can do after logging in.<br><strong>Conclusion<br><\/strong>The CIA Triad (Confidentiality, Integrity, Availability) is a basic but important set of rules to<br>ensure data security. Authentication and authorization are steps used to protect data and<br>systems by confirming who a user is and what they are allowed to do. Together, these<br>principles and practices help keep information safe and secure in any organization.<br>References<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>1. Chai, A. (2023). Cybersecurity Principles. Retrieved<br>from https:\/\/www.example.com.<br>2. Kennesaw State University. (2021). Cybersecurity Essentials: CIA Triad. Retrieved<br>from https:\/\/www.kennesaw.edu.<br>3. National Institute of Standards and Technology. (2017). Authentication and<br>Authorization Guide. NIST Special Publication 800-53. Retrieved<br>from https:\/\/www.nist.gov.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad stands for Confidentiality, Integrity, and Availability. These three principleshelp protect data in a secure system:1. ConfidentialityConfidentiality means keeping information private and only accessible to peoplewho have permission. For example, an online store keeps customer credit carddetails secret, and only the person who owns the card should be able to see theinformation.2. IntegrityIntegrity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nikoletobin\/2025\/02\/20\/cia-triad-overview\/\">Read More<\/a><\/div>\n","protected":false},"author":30404,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/posts\/344"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/users\/30404"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":345,"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/posts\/344\/revisions\/345"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/media?parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/categories?post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nikoletobin\/wp-json\/wp\/v2\/tags?post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}