{"id":274,"date":"2023-02-01T16:20:20","date_gmt":"2023-02-01T16:20:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sblac\/?p=274"},"modified":"2023-02-01T16:20:20","modified_gmt":"2023-02-01T16:20:20","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sblac\/2023\/02\/01\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p><strong>Bluf( Bottom line up front)<\/strong>&#8211; What exactly is the CIA triad and why do companies utilize it?<br>The CIA triad is a process that businesses use to protect information data and provide general security within the company. In this write up, I will be explaining the importance of<br>the CIA Triad, then later on talk about the differences between authorization and<br>authentication. \u21e9<br><strong>\u2192Explanation- CIA Triad<\/strong><br>The CIA triad is a guide to direct the policies for data security with an organization. All<br>of the key factors that make up the CIA triad are confidentiality, integrity, and availability. (Chai,<br>2022). These are very important in cybersecurity since all three of them as a whole create a good<br>process for companies to use. <strong>Availability<\/strong> makes sure that you can rely on and access the<br>information by certified individuals. Next,<strong> integrity<\/strong> assures everyone that the information is legit and dependable. Lastly, <strong>confidentiality <\/strong>is the arrangement of steps that minimizes the access to<br>that specific information. (Chai, 2022). This framework is a fantastic way to improve, protect,<br>and trust data in your company. (Coursera, 2022).<br><strong>\u2192Confidentiality<\/strong> is what helps the businesses information protect and minimizes the<br>information just enough to where peoples&#8217; files and data are secured in safe spots without disclosing a lot of data. To prevent hacking and the information from getting into the wrong<br>hands, businesses have to determine who can switch or update any of their data. (Coursera, 2022)<br><strong>Integrity <\/strong>&#8211; An example is if the electricity were to go out due to a natural disaster, then the<br>business makes sure to keep any past information and to back it up so none of it is lost.<br><strong>Accessibility <\/strong>is when companies allow certain people in that business to have access to files through email that are trusted. (Coursera, 2022).<br><strong>\u2192Authentication vs. Authorization<\/strong><br>\u2192<strong>Authorization<\/strong> comes afterwards and makes sure the person is granted permission to view the information or not. Meanwhile, <strong>authentication<\/strong> is checking the individual&#8217;s verification,<br>as well as their identification to see if they are the correct user\/person. An example of<br><strong>authentication<\/strong> is when you are trying to log in to your account or the duo mobile that we use to<br>log into our student accounts for college. (GG, 2022) Then for authorization they usually will use a web token or other forms of authorization tactics.<br>\u2192<strong>In conclusion<\/strong>, authorization, authentication, and the CIA triad are forms in helping people in charge manage their organizations data security. These processes can be beneficial for<br>them to use even though it is a simple act, it can protect a lot of individuals from getting information stolen and broken into.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bluf( Bottom line up front)&#8211; What exactly is the CIA triad and why do companies utilize it?The CIA triad is a process that businesses use to protect information data and provide general security within the company. In this write up, I will be explaining the importance ofthe CIA Triad, then later on talk about the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sblac\/2023\/02\/01\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":26126,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/users\/26126"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/posts\/274\/revisions\/279"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sblac\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}