{"id":281,"date":"2023-09-25T00:18:59","date_gmt":"2023-09-25T00:18:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tariqcyse\/?p=281"},"modified":"2023-09-25T00:18:59","modified_gmt":"2023-09-25T00:18:59","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tariqcyse\/2023\/09\/25\/the-cia-triad\/","title":{"rendered":"The CIA TRIAD"},"content":{"rendered":"\n<p>Tariq Sims<br>CYSE 200T<br>Professor Kirkpatrick<br>14 September 2023<br><\/p>\n\n\n\n<p>         The CIA Triad initially stands for Confidentiality, integrity, and availability. This is<br>essentially a model to help direct policies for information security within a company. These three<br>elements are the most fundamental needs for cybersecurity. But professionals believe that there<br>needs to be an upgrade in order to continue to be effective. The Triad is to help guide<br>information security to continue to improve the policies for organizations. Although there are<br>some challenges with the CIA Triad, for example big data can cause challenges because of the<br>expanded amount of information that organizations may need safeguarded; The difference<br>between Authentication and Authorization, is that one authentication means confirming and<br>processing who someone is known to be, and authorization is processing what type of files, data,<br>or information that the person has access to. They may sound pretty similar but for example,<br>Authentication comes into play before authorization, like an airline when they have to identify<br>you and once your identity is confirmed then you verify the specialties the specific person has<br>access to.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Citations:<\/p>\n\n\n\n<p>Chai, W. (2023). What is the CIA triad (confidentiality, integrity and availability)? <em>WhatIs.com<\/em>. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tariq SimsCYSE 200TProfessor Kirkpatrick14 September 2023 The CIA Triad initially stands for Confidentiality, integrity, and availability. This isessentially a model to help direct policies for information security within a company. These threeelements are the most fundamental needs for cybersecurity. But professionals believe that thereneeds to be an upgrade in order to continue to be effective&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tariqcyse\/2023\/09\/25\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":25599,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/posts\/281"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/users\/25599"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/posts\/281\/revisions"}],"predecessor-version":[{"id":282,"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/posts\/281\/revisions\/282"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/media?parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/categories?post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tariqcyse\/wp-json\/wp\/v2\/tags?post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}