{"id":293,"date":"2026-05-04T02:56:51","date_gmt":"2026-05-04T02:56:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/?p=293"},"modified":"2026-05-04T02:56:51","modified_gmt":"2026-05-04T02:56:51","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/2026\/05\/04\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"The CIA triad basically just refers to the three main objectives of cybersecurity. Those<br \/>three goals being, confidentiality, integrity, and availability. Confidentiality means keeping the<br \/>information secure so that people who don\u2019t have permission to see the information can\u2019t access<br \/>it. One example of this is a password on your phone to keep people from unlocking it. Integrity is<br \/>making sure that the information you are providing is correct and cannot be easily changed by<br \/>just anyone. One example of this is at schools, only the teacher can change the student\u2019s grade.<br \/>\u201cIn addition, organizations must put in some means to detect any changes in data that might<br \/>occur as a result of non-human-caused events such as an electromagnetic pulse server crash.\u201d<br \/>This quote shows that organizations are most times prepares for anything in order to keep their<br \/>data safe. The third and final one is availability. Availability means making sure that your<br \/>information is available and easily accessible to whoever wants to have access to it. One example<br \/>of this is a company keeping a website running 24\/7 so the customer can always get information.<br \/>Authentication is verifying who you are, an example of this is unlocking your phone with<br \/>your face. Authorization is what you are allowed to do after authentication, for example, after<br \/>unlocking your phone, you can\u2019t go look at your best friends bank account.<br \/>","protected":false},"excerpt":{"rendered":"<p>The CIA triad basically just refers to the three main objectives of cybersecurity. Thosethree goals being, confidentiality, integrity, and availability. Confidentiality means keeping theinformation secure so that people who don\u2019t have permission to see the information can\u2019t accessit. One example of this is a password on your phone to keep people from unlocking it. Integrity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/2026\/05\/04\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":32026,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/users\/32026"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/posts\/293\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nmartportfolio2\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}