{"id":282,"date":"2025-06-22T15:04:04","date_gmt":"2025-06-22T15:04:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rlee\/?p=282"},"modified":"2025-06-22T15:12:02","modified_gmt":"2025-06-22T15:12:02","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rlee\/2025\/06\/22\/the-cia-triad\/","title":{"rendered":"the CIA Triad"},"content":{"rendered":"The CIA Triad\u2014standing for Confidentiality, Integrity, and Availability\u2014is a fundamental framework used in cybersecurity to shape policies and protect information systems. As explained in the Chai article, Confidentiality focuses on limiting access to data so only approved individuals can view it. Tools like encryption, secure passwords, two-factor authentication (2FA), and access restrictions help enforce this. Integrity ensures that information remains accurate, consistent, and trustworthy throughout its use. This involves preventing unauthorized changes through tools such as checksums, digital signatures, and version tracking. Availability guarantees that systems and data are accessible when needed by legitimate users. Achieving this involves measures like system redundancy, routine maintenance, failover mechanisms, and disaster recovery plans.<br \/>Additionally, it&#8217;s important to understand the difference between authentication and authorization. Authentication is the process of confirming a person\u2019s identity\u2014such as logging in with a password or using a fingerprint. Authorizationhappens afterward and determines what actions or access the verified user is permitted to have. For example, a verified employee might be allowed to view internal files (authentication), but only certain roles can edit or delete them (authorization). In short, authentication answers \u201cWho are you?\u201d while authorization answers \u201cWhat can you do?\u201d Both concepts are vital in supporting the CIA Triad, especially when managing access and protecting data.<br \/>","protected":false},"excerpt":{"rendered":"<p>The CIA Triad\u2014standing for Confidentiality, Integrity, and Availability\u2014is a fundamental framework used in cybersecurity to shape policies and protect information systems. As explained in the Chai article, Confidentiality focuses on limiting access to data so only approved individuals can view it. Tools like encryption, secure passwords, two-factor authentication (2FA), and access restrictions help enforce this&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rlee\/2025\/06\/22\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":30933,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/users\/30933"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/282\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}