{"id":318,"date":"2024-12-03T19:20:55","date_gmt":"2024-12-03T19:20:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/?page_id=318"},"modified":"2024-12-03T19:23:14","modified_gmt":"2024-12-03T19:23:14","slug":"cia-triad-writeup","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/cia-triad-writeup\/","title":{"rendered":"CIA Triad writeup"},"content":{"rendered":"\n<p>Will Demarest<br>CIA Triad Write Up<br>The CIA triad is essential part to understand the 3 major components of<br>cybersecurity. The use of the triad in cybersecurity. It highlights what all cybersecurity<br>professionals fundamentally do in their jobs.<br>Confidentially<br>The C in the CIA triad means confidentiality. Information has different security priorities<br>depending on what the info is about. Most of the time in the business world, information<br>has some sort of security boundary whether its password protected or behind a locked<br>door protected. The more sensitive information is only to be known by the superiors of a<br>business.<br>Integrity<br>The I in the CIA triad means Integrity. Information should have safeguards and<br>redundancies to ensured that information in the system is not lost, inappropriately<br>changed, whether deliberately or accidentally.<br>Availability<br>The A in CIA triad means Availability. Information must always be accessible to the<br>superiors in a company. It must be protected by a security boundary, if its super easy to get<br>into on our end its probably easy to get into by a bad guy.<br>Will Demarest<br>Authentication vs Authorization<br>Authentication is the process of identifying a user on a platform. Example: logging into<br>your Midas account and having send a push notification on your phone to verify your<br>identity.<br>Authorization is the permissions that you are given after logging into a device or system.<br>Example: would be like using child account on Netflix, you will be only allowed to watch kid<br>rated content.<br>The difference between them is that authentication always comes before authorization.<br>To play a game on a computer you must enter your password then you can access the<br>game.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Will DemarestCIA Triad Write UpThe CIA triad is essential part to understand the 3 major components ofcybersecurity. The use of the triad in cybersecurity. It highlights what all cybersecurityprofessionals fundamentally do in their jobs.ConfidentiallyThe C in the CIA triad means confidentiality. Information has different security prioritiesdepending on what the info is about. Most of the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/cia-triad-writeup\/\">Read More<\/a><\/div>\n","protected":false},"author":29645,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/318"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/users\/29645"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/318\/revisions"}],"predecessor-version":[{"id":321,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/318\/revisions\/321"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/media?parent=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}