{"id":293,"date":"2024-12-01T19:58:13","date_gmt":"2024-12-01T19:58:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/robv\/?p=293"},"modified":"2024-12-01T20:06:32","modified_gmt":"2024-12-01T20:06:32","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/robv\/2024\/12\/01\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p class=\"has-text-align-left\"><br><\/p>\n\n\n\n<p>The CIA Triad (sometimes called the AIC triad) model is intended to be a guideline for information security policy in an organization. The triad&#8217;s three key concepts are confidentiality, integrity, and availability.<\/p>\n\n\n\n<p><strong>Confidentiality<\/strong><br>The confidentiality concept can be compared to privacy. The more sensitive a piece of data is the more damage can be done by it falling into the wrong hands. For this reason it is important to ensure that only those authorized are able to access critical information. Authentication with user ID and passwords are two of the most common ways to maintain confidentiality but some organizations will go as far as to keep sensitive data in hard-copy form.<\/p>\n\n\n\n<p><strong>Integrity<\/strong><br>The integrity concept focuses on maintaining the trust in your data. Back-ups can be used to ensure redundancy in an organization&#8217;s data but it cannot by itself prevent malicious changes in data to occur. According to Chai (2022), &#8220;digital signatures can be used to provide effective nonrepudiation measures, meaning evidence of logins, messages sent, electronic document viewing and sending cannot be denied.\u201d This can create an obstacle for insider threats and black hat hackers while also leaving a paper trail for authorized users making simple errors.<\/p>\n\n\n\n<p><strong>Availability<\/strong><br>The availability concept deals with the consistency of access for authorized users. Whether dealing with hardware or software there are many facets to this concept. Regular hardware maintenance and the evolving hardware requirements are constantly changing and cannot always be predicted. Events like fires, earthquakes, and power outages must be accounted for. Like hardware, software is also constantly evolving. Threats like zero day attacks and denial of service attacks can necessitate very rapid changes in software and hardware.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>The CIA model\u2019s three key concepts should form the base for information security policy. Users should be authorized to access what they need. This authorization should be authenticated with at the minimum a username and password. The information should be protected from being stolen, changed or deleted. Hardware and software should be protected from natural events and hacking threats.<\/p>\n\n\n\n<p><strong>References<\/strong><br>Hashemi-Pour, Cameron, and Wesley Chai. \u201cWhat Is the CIA Triad?: Definition from TechTarget.\u201d What Is the CIA Triad (Confidentiality, Integrity and Availability)?, TechTarget, 21 Dec. 2023, www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad (sometimes called the AIC triad) model is intended to be a guideline for information security policy in an organization. The triad&#8217;s three key concepts are confidentiality, integrity, and availability. ConfidentialityThe confidentiality concept can be compared to privacy. The more sensitive a piece of data is the more damage can be done by&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/robv\/2024\/12\/01\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":29769,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/users\/29769"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/posts\/293\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robv\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}