{"id":283,"date":"2025-09-26T21:07:19","date_gmt":"2025-09-26T21:07:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/stevengeter6\/?p=283"},"modified":"2025-12-05T18:12:07","modified_gmt":"2025-12-05T18:12:07","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/stevengeter6\/2025\/09\/26\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p class=\"has-text-align-center has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-59655d87d21a5aa347329891e885bc4a\"><strong>The Significance of the CIA Triad<\/strong><br> This article explains the CIA Triad, providing a model with the concepts of protecting information, data being trusted in a system, and allowing users to have access to such data.<br><br><strong><mark class=\"has-inline-color has-vivid-red-color\">CIA Triad<\/mark><\/strong><br> In the CIA Triad, there are three functions: confidentiality, integrity, and availability that make the security of data much stronger. Confidentiality is the first part of the triad that functions to keep information and data private for certain users. As Fortinet states, \u201cA key component of maintaining confidentiality is making sure that people without proper authorization are prevented from accessing assets important to your business\u201d(Fortinet, 2025). Integrity is the next portion in which consistency of data is very important to maintain. Users don\u2019t want important information to be altered, which would cause them to believe the company is not trustworthy; reliability is one of the most important purposes of having strong security systems. Availability is the last part of the triad, where users should confidently be able to access systems and data when needed. From the IT Governance, \u201cHigh availability is achieved by duplicating critical systems, keeping regular backups, using automatic failover, and monitoring performance to catch issues early\u201d(IT Governance, 2025). With all these features combined, it allows systems for cybersecurity to be at its best.<br><br><strong><mark class=\"has-inline-color has-vivid-red-color\">Authentication<\/mark><\/strong><br> What makes authentication important is that it\u2019s like a door that needs a key to be opened. The key relates to verifying your identity before opening the door, which reveals your information. Microsoft states, it\u2019s a crucial part of cybersecurity because a false user\u2019s top priority is to gain unauthorized access to systems(Microsoft, 2025). They do this by stealing the usernames and passwords of users who do have access(Microsoft, 2025). Examples of authentication would be playing a video game and having to put in two-factor authentication to be allowed into your account. It can also be the case with logging in to your email and having to put in a password or PIN.<br><br><strong><mark class=\"has-inline-color has-vivid-red-color\">Authorization<\/mark><\/strong><br> The purpose of authorization doesn\u2019t directly correlate with authentication because you&#8217;re permitting them permission to have access. You can log into an account or another service, but you will only have access to certain things because you&#8217;re not authorized to access certain information. A good example from auth0, \u201c A permission becomes a privilege (or right) when it is assigned to someone. So, if you assign permission to furnish your house to your interior decorator, you are granting them that privilege\u201d(auth0, 2025). With authorization, it is another level of security to keep important data from certain users. <br><br><strong><mark class=\"has-inline-color has-vivid-red-color\">Conclusion<\/mark><\/strong><br> To conclude this writing of the CIA Triad, each one of the three functions is vital to keeping cybersecurity information and systems secure. With the aid of authentication and authorization, this allows for another barrier to withstand false users from getting protected information. With so much technology in today\u2019s world, the CIA Triad will continue to be present for the safety of users&#8217; data systems.<br><br><br><strong><em>References<\/em><\/strong><br>\u201cWhat Is Authentication? Definition and Methods.\u201d Microsoft, https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-authentication. Accessed 14 September 2025.<br>\u201cWhat is Authorization? &#8211; Examples and definition.\u201d Auth0, https:\/\/auth0.com\/intro-to-iam\/what-is-authorization. Accessed 14 September 2025.<br>\u201cWhat is the CIA Triad and Why is it important?\u201d Fortinet, https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad. Accessed 14 September 2025.<br>\u201cWhat Is the CIA Triad and Why Is It Important?\u201d IT Governance, 18 June 2025, https:\/\/www.itgovernance.co.uk\/blog\/what-is-the-cia-triad-and-why-is-it-important. Accessed 14 September 2025.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Significance of the CIA Triad This article explains the CIA Triad, providing a model with the concepts of protecting information, data being trusted in a system, and allowing users to have access to such data. CIA Triad In the CIA Triad, there are three functions: confidentiality, integrity, and availability that make the security of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/stevengeter6\/2025\/09\/26\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":31586,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/posts\/283"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/users\/31586"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/posts\/283\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/posts\/283\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/media?parent=283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/categories?post=283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/tags?post=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}