{"id":294,"date":"2026-04-14T19:23:33","date_gmt":"2026-04-14T19:23:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/?p=294"},"modified":"2026-04-14T19:23:33","modified_gmt":"2026-04-14T19:23:33","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/2026\/04\/14\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>The CIA Triad is built on Confidentiality, Integrity, and Availability and together, these concepts help to form all policies and procedures for a business to function on. Each component of this model aids and protects an organization in a particular way and by breaking them down, we can see how they address and ensure the safety of a business and its customers. <br><br><strong>Confidentiality-Authorize<\/strong><br><br>Confidentiality ensures that only individuals authorized to view sensitive information have access to it. According to the reading, the author Wesley writes, \u201cIt is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands\u201d (para 3). Categories of importance are based on least to most critical if exposed by unauthorized users. A critical method for ensuring confidentiality in an organization is through multi-factor authentication, strong passwords, and training to keep employees aware of the types of threats that they may face.<br><br><strong>Integrity-Trustworthiness<\/strong><br><br>Integrity refers to maintaining the \u201ctrustworthiness\u201d of the data an organization keeps. At any stage of the data\u2019s lifecycle, it the organization\u2019s responsibility to keep the data from being altered or changed from unauthorized users. Unauthorized modifications to data could lead to disastrous consequences not only to an organization but potentially the safety of the individual. Methods to keeping the integrity of data secure often involves data encryption, digital signatures, or hashing.<br><br><strong>Availability-Readiness<\/strong><br><br>Availability means that information must be readily available in a timely manner for access from those authorized to see or use it. This fact involves maintaining the hardware, networks, and servers within the organization. Methods to ensure an organization stays operational and available to users involves formulating a business continuity plan and disaster recovery plan which incorporates back up locations and hardware just in case of a natural disaster. Availability can also be accomplished by updating software.<br><br><strong>Authentication and Authorization<\/strong><br><br> Additionally, authentication and authorization are integral parts within the information security field. As mentioned above, Authorization is the act of granting access to certain individuals that have a particular job or role. Only permitted individuals will have access to certain resources to ensure security. Authentication is the process of verifying a user\u2019s identity. Different methods of conducting authentication is through the use of physical objects such as ID cards or keys, passwords, or biometrics such as index fingerprints or retina scanners. Authorization typically follows authentication in any security posture. To give an example, a student at ODU authenticates his identity by signing into canvas with his unique username and password. Once verified, he is given authorization into his student account to perform his duties given only to the role of a student and none else.<br><br><strong>Conclusion<\/strong><br><br> Although there are some challenges with maintaining the CIA Triad, this model is foundational for any organization to incorporate in their policies when it comes to data classification and threat modeling. \u201cThinking of the CIA Triad\u2019s three concepts together as an interconnected system, rather than as independent concepts, can help organizations understand the relationship between the three.\u201d (Para 8).<br> <br>\u2003<br><strong>Works Citied<\/strong><br><br>Chai, W. (2022, June 28). What is the CIA Triad? Definition, Explanation, Examples. TechTarget. What is the CIA Triad_ Definition, Explanation, Examples &#8211; TechTarget.pdf &#8211; Google Drive<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is built on Confidentiality, Integrity, and Availability and together, these concepts help to form all policies and procedures for a business to function on. Each component of this model aids and protects an organization in a particular way and by breaking them down, we can see how they address and ensure the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/oliviaweaver\/2026\/04\/14\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":32130,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/users\/32130"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/posts\/294\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/oliviaweaver\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}