{"id":345,"date":"2025-04-27T17:03:17","date_gmt":"2025-04-27T17:03:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/potts\/?p=345"},"modified":"2025-04-27T17:08:28","modified_gmt":"2025-04-27T17:08:28","slug":"write-up-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/potts\/2025\/04\/27\/write-up-cia-triad\/","title":{"rendered":"Write-Up: CIA Triad"},"content":{"rendered":"\n<p><strong>BLUF<\/strong><br>The CIA triad is an idea that information security consists of three main components:<br>confidentiality, integrity, and availability. This write-up will further detail the CIA triad and the<br>difference between authentication and authorization.<\/p>\n\n\n\n<p><br><strong>The Triad<\/strong><br>The CIA triad is made up of confidentiality, integrity, and availability. Confidentiality deals with<br>safeguarding personal privacy and sensitive information. Integrity has to do with the guarantee<br>that information is reliable and correct. (Cawthra et al., 2020) Finally, availability ensures access<br>to information. These three main components are the most important within information security.<br>By utilizing all three components, organizations can better develop security policies and ask<br>more concentrated questions to determine the value that all three are providing. (Chai, 2022)<\/p>\n\n\n\n<p><br><strong>Authentication Vs. Authorization<\/strong><br>Authentication and authorization both have to do with a systems\u2019 access management but they<br>differ in their distinct purpose. Authentication confirms the identity of the user and authorization<br>is the process of allowing the user to access the system. Another key difference is that<br>authentication relies on a user&#8217;s credentials whereas authorization relies on a user&#8217;s specific<br>permissions. In other words, authentication is like entering your username and password into<br>your computer and authorization is like when a user accesses their email account but they aren\u2019t<br>authorized to view others emails. Both of these processes work together to prevent breaches<br>and to ensure access control is secured. (Kosinski, 2024)<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><br>All in all, the CIA triad is an important and simple framework to follow. The three components:<br>confidentiality, integrity, and availability all work together to properly protect information security. In addition to the triad, authentication and authorization work hand in hand to prevent<br>unauthorized access and protect information.<\/p>\n\n\n\n<p><strong>References<\/strong><br>Cawthra, Jennifer, et al. \u201cExecutive Summary \u2014 NIST SP 1800-26 Documentation.\u201d<br>Nccoe.Nist.Gov, Dec. 2020, www.nccoe.nist.gov\/publication\/1800-26\/VolA\/index.html.<\/p>\n\n\n\n<p><br>Chai, Wesley. What Is the CIA Triad? Definition, Explanation, Examples,<br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?jr<br>=on.<\/p>\n\n\n\n<p><br>Kosinski, Matthew. \u201cAuthentication vs. Authorization: What\u2019s the Difference?\u201d IBM, 2 Dec.<br>2024, www.ibm.com\/think\/topics\/authentication-vs-authorization.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUFThe CIA triad is an idea that information security consists of three main components:confidentiality, integrity, and availability. This write-up will further detail the CIA triad and thedifference between authentication and authorization. The TriadThe CIA triad is made up of confidentiality, integrity, and availability. Confidentiality deals withsafeguarding personal privacy and sensitive information. Integrity has to do [&hellip;]<\/p>\n","protected":false},"author":30269,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"hide_page_title":"","footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/posts\/345"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/users\/30269"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/posts\/345\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/posts\/345\/revisions\/357"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/media?parent=345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/categories?post=345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/potts\/wp-json\/wp\/v2\/tags?post=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}