{"id":296,"date":"2025-12-04T20:27:57","date_gmt":"2025-12-04T20:27:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/?p=296"},"modified":"2025-12-04T20:27:57","modified_gmt":"2025-12-04T20:27:57","slug":"write-up-for-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/2025\/12\/04\/write-up-for-cia-triad\/","title":{"rendered":"Write-up for CIA Triad"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Raymond Griffin<br>9\/11\/2025<br>CIA Triad Write Up<br>The difference between authorization and authentication is that authentication verifies<br>who you are for example, by entering a username and password\u2014while authorization<br>determines what you&#8217;re allowed to do or access. The role authentication plays in the<br>CIA Triad is confidentiality. As the article states, \u201cConfidentiality is roughly equivalent to<br>privacy,\u201d meaning it keeps sensitive information protected from unauthorized access.<br>Authorization plays two roles: confidentiality and integrity. The article also notes that<br>\u201cintegrity is the assurance that information is trustworthy and accurate.\u201d<br>The reason the CIA Triad is important is because it helps organizations develop<br>effective security policies and rules. More specifically, the CIA Triad helps prevent data<br>breaches and identity theft by securing data through encryption, access controls, and<br>authentication key components of confidentiality. Integrity focuses on preserving data<br>accuracy. Examples of threats to integrity include tampering and data corruption. To<br>ensure data remains unchanged and trustworthy, systems use techniques like<br>checksums, hashing, and version control.<br>Availability ensures that systems and data are accessible whenever users need them<br>day or night. It helps prevent downtime and service disruptions by implementing<br>backups, redundancy, and failover systems.<br>The CIA Triad Confidentiality, Integrity, and Availability is the backbone of cybersecurity,<br>guiding how organizations protect their data and systems. By understanding the roles of<br>authentication and authorization within this framework, we see how identity verification<br>and access control directly support the protection and accuracy of sensitive information.<br>Each pillar of the triad plays a vital role: confidentiality prevents unauthorized access,<br>integrity ensures data remains trustworthy, and availability guarantees users can access<br>resources when needed. Together, they form a balanced and effective strategy to<br>defend against threats like data breaches, tampering, and service disruptions making<br>the CIA Triad essential for building secure, resilient systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Raymond Griffin9\/11\/2025CIA Triad Write UpThe difference between authorization and authentication is that authentication verifieswho you are for example, by entering a username and password\u2014while authorizationdetermines what you&#8217;re allowed to do or access. The role authentication plays in theCIA Triad is confidentiality. As the article states, \u201cConfidentiality is roughly equivalent toprivacy,\u201d meaning it keeps sensitive information&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/raymondgriffin\/2025\/12\/04\/write-up-for-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31060,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/users\/31060"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}