{"id":282,"date":"2021-11-22T18:27:17","date_gmt":"2021-11-22T18:27:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shacarapitre\/?p=282"},"modified":"2021-11-22T18:27:18","modified_gmt":"2021-11-22T18:27:18","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/shacarapitre\/2021\/11\/22\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>The purpose and primary goal of the CIA Triad is to protect the data of different organizations. It is a \u201cinformation security model\u201d that is used by many organizations to keep their information secure. When it comes to the creation of the CIA Triad, there is no record of just one creator of the model. This is due to the fact that it formed over time as an article regarding security pros and wisdom. The initials in CIA stand for Confidentiality, Integrity, and Availability. They are the three principles when it comes to keeping information secure; hence, where the word triad comes from. It is estimated that the concept of these principles was established sometime around 1998. However, there is no evidence to prove when they were collectively grouped to describe the CIA Triad. First, confidentiality means that data can only be seen or altered by people who are authorized to view the information. Second, integrity is being able to maintain the correct information without unauthorized people having access to data, which can lead to corrupt files. Third, availability is allowing authorized users to have access to information whenever it needs to be viewed. <br><br>Now, I will go into the difference between authentication and authorization. Authentication is a step by step process \u201cthat allows systems to determine if a user is who they say they are\u201d (Fruhlinger, 2020). In other words, it is like using a two-step authentication to log into a website. For example, when we log into our ODU portal, blackboard, email etc., we are prompted to either send a push notification to our phone via the DUO mobile app or we can enter a password that will be sent to our phones. As a result, this ensures that the person logging into an account is actually them because it would be going to that persons\u2019 phone. According to the Fruhlinger article, some of the techniques used to identify a person include: security tokens, cryptographic keys, biometrics, etc. <br><br>On the other hand, authorization is how a system determines who has access to view certain information. To clarify, \u201cjust because a system knows who you are, it doesn\u2019t necessarily open all its data for your perusal!\u201d (Fruhlinger, 2020). In other words, authorization is used for many websites and systems to ensure security of data in the sense that it is not being looked at by unauthorized viewers. An example of authorization would be \u201c&#8230;having many files only accessible by their creators or an admin\u201d (Fruhlinger, 2020). Another example of authorization would be something as simple as viewing a persons\u2019 social media profile. Furthermore, if a person has their account private, only people who follow them or who they approve to follow will be able to see their posts. <br><br>Reference: <br>Fruhlinger, Josh (2020). The CIA Triad: Definition, components, and examples. IDG Communications, Inc.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The purpose and primary goal of the CIA Triad is to protect the data of different organizations. It is a \u201cinformation security model\u201d that is used by many organizations to keep their information secure. When it comes to the creation of the CIA Triad, there is no record of just one creator of the model&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/shacarapitre\/2021\/11\/22\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":21864,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/users\/21864"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/posts\/282\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shacarapitre\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}