{"id":297,"date":"2024-11-15T23:50:16","date_gmt":"2024-11-15T23:50:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/steven-sori\/?p=297"},"modified":"2024-11-15T23:50:16","modified_gmt":"2024-11-15T23:50:16","slug":"cia-write-up","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/steven-sori\/2024\/11\/15\/cia-write-up\/","title":{"rendered":"CIA write-up:"},"content":{"rendered":"\n<p>CIA Triad: The policy guide<br>BLUF: When evaluating needs and use cases for potential new products and technologies, the<br>triad helps organizations and companies narrow their focus about how value is being provided in<br>three key areas: Confidentiality, Integrity, and Availability.<br>The CIA triad essentially provides organizations with a guideline in protecting their<br>sensitive data and systems via 3 pillars vital to cybersecurity needs, including Confidentiality,<br>Integrity, and Availability. How does each one of these pillars play a role you may ask? well to<br>start off with, Confidentiality ensures that only authorized users can access sensitive information<br>and privacy rights are not being violated. Integrity allows users to know that the data they are<br>seeing is both accurate and reliable. While availability provides users with reliable and timely<br>access to sensitive information with the proper authorization. Two-factor authentication is a great<br>example of Confidentiality because it requires users attempting to access a site or sensitive<br>information to provide more than one valid login method to ensure it is really them. User access<br>controls are an example of how Integrity allows us to control who is able to access which<br>information and monitor the cyber traffic of data, allowing administrators to know that their data<br>is untampered and used safely. Fast and adaptive disaster recovery is a shining example as it<br>relates to availability of information because it is easy for a server to crash or computer to<br>malfunction, being able to quickly recover this information provides users with the ability to<br>access certain data even in emergent scenarios. Such as the crowd strike incident that occurred<br>recently, a lot of networks and servers crashed without notice, causing thousands of interruptions<br>in day-to-day operations including businesses and airlines. However, this model is not fool proof.<br>It has its weaknesses, which Wesley Chai highlights in his article, \u201cbecause the main concern of<br>big data is collecting and making some kind of useful interpretation of all this information,<br>responsible data oversight is often lacking\u201d (Chai, Page 5). This emphasizes that while CIA<br>model is meant to help protect the data collection systems, it can become overwhelming to<br>properly manage all of it.<br>Let\u2019s explore the difference between Authentication and Authorization. When talking<br>about Authorization, we are speaking about what a user is allowed to do, such as what resources<br>or services they can access. On the other hand, Authentication is all about verifying that a user\u2019s<br>identity is valid and they are indeed able to access a specific site or service. Although<br>authentication is used in conjunction with authorization to allow a user access to an intended<br>service, they are distinct.<\/p>\n\n\n\n<p>In conclusion, it is important to make note that the CIA model is a great resource for<br>cyber security professionals to structure their policies after and allow a company or organization<br>to function in a safe cyber environment where the flow of data is seamless and protected. One<br>weakness to highlight is that while the model may successfully assist with governing policies on<br>how to best protect cyber systems, when protecting sensitive data, it is imperative to ensure that the data size is not overwhelming to the point where a lack of oversight exists.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CIA Triad: The policy guideBLUF: When evaluating needs and use cases for potential new products and technologies, thetriad helps organizations and companies narrow their focus about how value is being provided inthree key areas: Confidentiality, Integrity, and Availability.The CIA triad essentially provides organizations with a guideline in protecting theirsensitive data and systems via 3 pillars&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/steven-sori\/2024\/11\/15\/cia-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":29580,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/users\/29580"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/posts\/297\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}