{"id":274,"date":"2023-01-31T16:24:57","date_gmt":"2023-01-31T16:24:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/technit\/?p=274"},"modified":"2023-01-31T16:24:57","modified_gmt":"2023-01-31T16:24:57","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/technit\/2023\/01\/31\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>Confidentiality, integrity, and availability are what is known as the CIA triad. This triad <br>is a guide on how to operate in the cybersecurity field; concepts that are the guidelines for good <br>technology fields. In the importance of this, this plays a role in maintaining your data safe and <br>protected from threats ( Mrinial Prakash).    <br> <br> <strong>Three Key Concepts   <br><\/strong>The first concept, confidentiality, is to ensure that information is private and protected. <br>Confidentiality in the workplace or a professional environment is of utmost importance. <br>Protecting data in the workplace amongst employers can fall into compliance with many federal and state regulations. For example, not every employer is authorized to see data in banking or in a government agency. Authoritarian representatives are needed to make sure the data is protected, especially when sharing information. So, using this concept data should be handled <br>based on the organization&#8217;s required privacy (Wesley Chai). Integrity is the honesty or virtue of <br>data that is reliable and accurate. If your company provides information about senior managers <br>on your website, this information needs to have integrity. If it is inaccurate, those visiting the <br>website for information may feel your organization is not trustworthy. If you want to have a <br>good company, it must be a two-way street between the employers and the consumers. Not <br>implementing virtue keeps the organization at risk if information leaks out. Lastly is availability, <br>which is when \u201csystems are available to individuals under the circumstance, like power outages <br>or natural disaster.\u201d I remember when Hurricane Ian put a great toll on Florida causing people to <br>lose power which led to searches. Having availability provides the immediate function of the <br>system that is working. \u201cCountermeasures to help guarantee availability include redundancy in <br>servers, internal networks, applications.\u2019\u2019 This guided application makes sure everything is <br>ensured.  <br> <br><strong>Authentication &amp; Authorization   <\/strong><br>Now relating to the CIA Triad, how does this play a role and authentication and <br>authorization in the workplace? Authentication \u201cverifies the identity of a user or service, and <br>authorization determines their access rights.\u201d When I think of authentication it looks back to <br>confidentiality and integrity because you want to make sure that your data systems are secure <br>and have access to vulnerable information. For example, governments use different <br>authentication techniques to protect their currency from counterfeiting. When I think of <br>authorization it is the accomplice of the distinct levels of security and who has the right to look <br>over data. <br> <br> <br><strong>CONCLUSION <\/strong><br>In conclusion, the CIA triad is a great mechanic for teaching. Just like the NIST <br>framework this ties into the CIA triad. The information that this triad offers shows how valuable <br>it is to the company to implement these key concepts. <br> <br><br> <br><br> <br><strong>Works Cited <\/strong><br> <br>Prakash, Mrinal. \u201cCIA Triad in Cyber Security: Definition, Examples, Importance.\u201d <br>Knowledgehut.com, 23 Jan. 2023, www.knowledgehut.com\/blog\/security\/cia-in-cyber-security. <br>Accessed 28 Jan. 2023.  <br>\u201cAuthentication vs. Authorization: What&#8217;s the Difference?\u201d OneLogin, <br>www.onelogin.com\/learn\/authentication-vs-authorization.  <br>\u201cWhat Is the CIA Triad and Why Is It Important?\u201d Fortinet, <br>www.fortinet.com\/resources\/cyberglossary\/cia-triad.  <br>\u201cConfidentiality, Integrity, and Availability in Cyber Security.\u201d Kobalt.IO, <br>kobalt.io\/blogpost\/confidentiality-integrity-and-availability-in-cyber-<br>security\/#:~:text=The%20final%20component%20of%20the,power%20outages%20or%20natura<br>l%20disasters.  <br>Chai, Wesley. \u201cWhat Is the CIA Triad? Definition, Explanation, Examples &#8211; <br>TechTarget.\u201d WhatIs.com, TechTarget, 28 June 2022, <br>[Last Name] 4 <br>www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-<br>CIA#:~:text=Confidentiality%2C%20integrity%20and%20availability%2C%20also,information<br>%20security%20within%20an%20organization.  <br> <br> <br> <br> <br> <br> <br> <br> <br> <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Confidentiality, integrity, and availability are what is known as the CIA triad. This triad is a guide on how to operate in the cybersecurity field; concepts that are the guidelines for good technology fields. In the importance of this, this plays a role in maintaining your data safe and protected from threats ( Mrinial Prakash)&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/technit\/2023\/01\/31\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":25524,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/users\/25524"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":278,"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/posts\/274\/revisions\/278"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/technit\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}