{"id":282,"date":"2025-09-22T23:09:32","date_gmt":"2025-09-22T23:09:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/salahadin06\/?p=282"},"modified":"2025-09-22T23:10:14","modified_gmt":"2025-09-22T23:10:14","slug":"strengthening-cyber-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/salahadin06\/2025\/09\/22\/strengthening-cyber-security\/","title":{"rendered":"Strengthening Cyber Security"},"content":{"rendered":"\n<p>Strengthening Cyber Security<br><br><br><br><br> BLUFF (Bottom Line Up Front)<br>With the help of the CIA Triad,confidentiality, honesty, and availability, information security is built on the basis of safe, accurate, and easy access data. Authorization establishes user privileges, while authentication confirms user identification; both are very important  tools for upholding the CIA Triad&#8217;s tenets.<br><br><br>The CIA Triad<br><br>One well-known theory that I think directs information security procedures is the CIA Triad. Chai (2023) argues that the triad is made up of three linked components:  Confidentiality Preventing unwanted access to data. Encrypting data, for instance, makes sure that the hackers cannot read credit card numbers that have been captured. \u2022 Integrity: Making certain that data is correct and unaffected. Digital signatures or hashing are frequently used to verify that documents or files have not been altered. \u2022 Availability: Ensuring that authorized users may access data and systems when they&#8217;re needed. Measures that guarantee availability include redundancy, backups, and defenses against denial-of-service (DoS) assaults (Fortinet, n.d.). It&#8217;s crucial to strike a balance between these three factors because concentrating too much on one could compromise the others.<br><br>Authentication vs. Authorization<br><br><br>Despite their frequent confusion, authorization and authentication are two different but related steps: The question, &#8220;Who are you?&#8221; is asked by authentication. I think that It involves using a bunch of credentials like passwords, fingerprints, or multiple logins to confirm identification (IBM, n.d.). For instance, using a password and one-time code to access an email account confirms the user&#8217;s identity.  Authorization provides an answer to the ask, &#8220;What are you permitted to do.  The system decides what resources or actions the user can access after identity verification . An employee might, for example, be logged into a corporate system but only have access to the files in their department, not the company database as a whole<br><br><br>Conclusion<br><br><br>Into my conclusion.The basis for safe information systems is provided by the CIA Triad  availability, confidentiality, and integrity. Despite being separate procedures, authorization and authentication cooperate to uphold the triad. Authorization controls access privileges, whereas authentication confirms the identity of the user. When combined, they guarantee that data is safe, reliable, and accessible, promoting user confidence and organizational operations.<br><br><br>References<br>Chai, W. (2023). What is the CIA triad (confidentiality, integrity and availability)? TechTarget. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA <br>Fortinet. (n.d.). Authentication vs. authorization: What\u2019s the difference? Fortinet CyberGlossary. https:\/\/www.fortinet.com\/resources\/cyberglossary\/authentication-vs-authorization <br>IBM. (n.d.). Authentication vs. authorization: What\u2019s the difference? IBM Think. https:\/\/www.ibm.com\/think\/topics\/authentication-vs-authorization <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Strengthening Cyber Security BLUFF (Bottom Line Up Front)With the help of the CIA Triad,confidentiality, honesty, and availability, information security is built on the basis of safe, accurate, and easy access data. Authorization establishes user privileges, while authentication confirms user identification; both are very important tools for upholding the CIA Triad&#8217;s tenets. The CIA Triad One&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/salahadin06\/2025\/09\/22\/strengthening-cyber-security\/\">Read More<\/a><\/div>\n","protected":false},"author":31536,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/users\/31536"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/posts\/282\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}