{"id":223,"date":"2026-04-27T01:57:48","date_gmt":"2026-04-27T01:57:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ntm1794\/?p=223"},"modified":"2026-04-27T01:57:48","modified_gmt":"2026-04-27T01:57:48","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ntm1794\/2026\/04\/27\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>The C.I.A. Triad: A Synopsis<br>Nicholas T. Martin<br>Department of Cybersecurity: Old Dominion University<br>CYSE-200: Cybersecurity, Technology, and Society<br>Professor Skip Hiser<br>2\/15\/2026<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>The C.I.A. Triad: A Synopsis<\/strong><\/p>\n\n\n\n<p><br><strong>BLUF<\/strong>: The C.I.A. Triad is an acronym which describes the foundational concepts of a<br>functional and secure system. The meaning of the acronym is: confidentiality, integrity, and<br>availability. This document will serve as a primer to those concepts, as well as introduce the<br>terms authentication and authorization.<\/p>\n\n\n\n<p><br><strong>Background<\/strong><br>According to Wesley Chai\u2019s article, What is the CIA Triad? Definition, Explanation,<br>Examples, there is no single origin of the C.I.A. Triad. Rather, it was a gradual evolution of<br>security practices developed following the adoption of informational and digital infrastructures.<br>It is believed that the United States Airforce first established confidentiality as a security<br>standard in 1976, with further developments in 1987 and 1988 until being first defined as we<br>know it now in 1998 (Chai, 2022). Since then, the C.I.A. Triad has become largely accepted as<br>the core principles by which information and data security methodologies are formed.<\/p>\n\n\n\n<p><br><strong>Definitions<\/strong><br>\u25aa Confidentiality \u2013 In short, confidentiality can be summed up as data privacy. That is, the<br>act of restricting unauthorized users from accessing secure networks. Some key examples<br>of this are authorization and authentication, which will be defined later in this document.<br>\u25aa Integrity \u2013 This concept promotes the preservation of information and\/or data in storage<br>as well as in communication. This means that no data shall be omitted, altered, or<br>misrepresented by unauthorized users. An example of this in practice is digital signatures,<br>where various forms of digital communications are signed by the original author to<br>ensure the integrity of the information sent.<br>\u25aa Availability \u2013 Secure networks and digital data are as important as they are accessible to<br>authorized users. Certain kinds of cyber-attacks, namely ransomware, are employed by<br>malicious actors to lock authorized users out of their systems and hold the data ransom in<br>exchange for monetary gain. With effective confidentiality practices, a system can be<br>protected from these forms of malicious software and prevented from being compromised<br>(Chai, 2022).<br>\u25aa Authentication \u2013 This term describes the process of verifying the identity of a user and<br>determining whether they are authorized to access any given system. Examples of this are<br>passwords and biometrics which are personalized and unique to each authorized user.<br>\u25aa Authorization \u2013 Typically following authentication, authorization processes determine<br>what functions and aspects of a system authorized users can access. A common example<br>of this is role-based access control (RBAC), which is a system configuration which<br>grants specific roles to each user, granting them only the access to a system they require<br>(frontegg, 2024).<\/p>\n\n\n\n<p><br><strong>Authentication and Authorization<\/strong><br>As noted above, authentication and authorization are often employed together to secure a<br>system. The process of authentication verifies a user, and authorization determines how said user<br>can interface with a system. Both procedures are employed to ensure the confidentiality of a<br>system by allowing only authorized users to gain access and to utilize that system in only<br>approved ways (frontegg, 2024).<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><br>No single concept of the C.I.A. Triad is more important than another. Instead, all three<br>are equally vital in ensuring the functionality and security of a system. For instance, overly<br>stringent confidentiality practices often damage availability, and inversely, neglected<br>confidentiality practices allow too much availability and threaten the integrity of data and<br>information. All three must be cultivated and tailored to specific systems so that authorized users<br>are able to productively utilize a system while also safeguarding the system from unauthorized<br>users. Though not a part of the C.I.A. Triad, authentication and authorization are widely accepted<br>and utilized in the information and cyber security industry as general practices to ensure<br>confidentiality.<\/p>\n\n\n\n<p><br><strong>References<\/strong><br>Authentication vs Authorization: Similarities and 5 Key Differences. (2024, August 19).<br>frontegg. https:\/\/frontegg.com\/blog\/authentication-vs-authorization<br>Chai, Wesley. (2022, June 28). What is the CIA Triad? Definition, Explanation, Examples.<br>TechTarget. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-<br>availability-CIA?jr=on<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The C.I.A. Triad: A SynopsisNicholas T. MartinDepartment of Cybersecurity: Old Dominion UniversityCYSE-200: Cybersecurity, Technology, and SocietyProfessor Skip Hiser2\/15\/2026 The C.I.A. Triad: A Synopsis BLUF: The C.I.A. Triad is an acronym which describes the foundational concepts of afunctional and secure system&#8230;. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/ntm1794\/2026\/04\/27\/cia-triad\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31982,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/posts\/223"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/users\/31982"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/posts\/223\/revisions"}],"predecessor-version":[{"id":224,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/posts\/223\/revisions\/224"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/media?parent=223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/categories?post=223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ntm1794\/wp-json\/wp\/v2\/tags?post=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}