{"id":275,"date":"2021-12-06T04:54:18","date_gmt":"2021-12-06T04:54:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/terranceboakye\/?p=275"},"modified":"2021-12-06T04:54:19","modified_gmt":"2021-12-06T04:54:19","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/terranceboakye\/2021\/12\/06\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>The CIA Triad consists of three things. Confidentiality, Integrity, and Availability. The<br>purpose of the CIA Triad is to securely protect an organization&#8217;s data. The letter &#8220;C&#8221; in the triad<br>stands for Confidentiality, which means that only people who are authorized are able to access or<br>revise data. &#8220;I&#8221; stands for Integrity, which means that the data must be maintained and guarded to<br>where no one can change it. Finally, the &#8220;A&#8221; in the triad stands for Availability which means<br>when the data is available to the users. Even though authentication and authorization are kind of<br>what similar they are different. Authentication is basically confirming who the person says who<br>they are for example when you login into some websites they have some things to determine if<br>you are a robot by giving questions like telling you to pick a picture with cars and etc. On the<br>other hand, Authorization is when the system can recognize you but it determines what you can<br>access. for example, you can say that a school can have some information about you but they are<br>limited to some things such as they are not able to see your social security number and other<br>things of the sort.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad consists of three things. Confidentiality, Integrity, and Availability. Thepurpose of the CIA Triad is to securely protect an organization&#8217;s data. The letter &#8220;C&#8221; in the triadstands for Confidentiality, which means that only people who are authorized are able to access orrevise data. &#8220;I&#8221; stands for Integrity, which means that the data must&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/terranceboakye\/2021\/12\/06\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":21984,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/275"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/users\/21984"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/comments?post=275"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/275\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/275\/revisions\/279"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/media?parent=275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/categories?post=275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/tags?post=275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}