{"id":338,"date":"2025-10-06T00:58:52","date_gmt":"2025-10-06T00:58:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/?page_id=338"},"modified":"2025-10-06T01:00:20","modified_gmt":"2025-10-06T01:00:20","slug":"write-up-the-cia-triad","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/write-up-the-cia-triad\/","title":{"rendered":"Write-Up: The CIA Triad"},"content":{"rendered":"\n<p>The CIA Triad represents the fundamental concept in cybersecurity. The members of this triad can be interpreted as confidentiality, integrity, and availability. Confidentiality, according to Chai, ensures that only authorized persons may use the given information. This can be done through a variety of means, such as encryption or other access controls. Integrity preserves the data in the form it was originally created or intended to be used; such techniques include hashing and digital signatures. Availability assures the possibility for authorized users to use the data or related resources when they need them\u2014implemented through redundancy and backups. In a way, the three work together towards one principle, which is the establishment of a secure information system.\u00a0<\/p>\n\n\n\n<p>Considering this, allow me to explain the difference between authentication and authorization. Authentication is the process whereby an identity is verified\u2014whether it is logging into a system by entering a password or providing authentication by some other means such as multifactor authentication. Authorization takes place after authentication and defines what resources a user is allowed to access. An employee may successfully authenticate into the system but needs to be in finance to be authorized to access payroll records. In short, authentication is &#8220;Who are you?&#8221; while authorization is &#8220;What are you allowed to do?&#8221;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad represents the fundamental concept in cybersecurity. The members of this triad can be interpreted as confidentiality, integrity, and availability. Confidentiality, according to Chai, ensures that only authorized persons may use the given information. This can be done through a variety of means, such as encryption or other access controls. Integrity preserves the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/write-up-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31273,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/wp-json\/wp\/v2\/pages\/338"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/wp-json\/wp\/v2\/users\/31273"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/wp-json\/wp\/v2\/comments?post=338"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/wp-json\/wp\/v2\/pages\/338\/revisions"}],"predecessor-version":[{"id":341,"href":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/wp-json\/wp\/v2\/pages\/338\/revisions\/341"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ramzialkaifi\/wp-json\/wp\/v2\/media?parent=338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}