{"id":284,"date":"2025-04-06T06:28:33","date_gmt":"2025-04-06T06:28:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/?p=284"},"modified":"2025-04-08T00:16:35","modified_gmt":"2025-04-08T00:16:35","slug":"the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/2025\/04\/06\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"596\" src=\"http:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/CIA-triad-image-1024x596.jpg\" alt=\"\" class=\"wp-image-285\" style=\"width:776px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/CIA-triad-image-1024x596.jpg 1024w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/CIA-triad-image-300x174.jpg 300w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/CIA-triad-image-768x447.jpg 768w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/CIA-triad-image-1536x893.jpg 1536w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/CIA-triad-image-516x300.jpg 516w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/CIA-triad-image.jpg 1857w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p> <\/p>\n\n\n\n<p>The CIA triad \u2013 Confidentiality, Integrity, and Availability \u2013 is a foundational model used within Information security that acts as a guide to create security systems or methods. Authentication and Authorization are important components of this foundation. With authentication ensuring that only verified users can access systems and authorization, they only access resources they need to.&nbsp; An understanding of these concepts is essential to ensuring proper cybersecurity measures.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Confidentiality&nbsp;<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\">&nbsp;          The first component, confidentiality, means to keep sensitive information a secret (Michali, 2023). This includes the various methods used to prevent leakage of that data like authorization, encryption, two-factor authentication and security tokens. In this way there are levels to gain access to important information and lowering the risks of breaches.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Integrity<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Integrity is the maintenance of the authenticity and trust in data. This is to ensure that important information is free form tampering and remains accurate to use (What is the CIA triad and why is it important?). Some examples of this are seen in digital signatures to help with verification and monitoring modifications to data, Hashes and Checksums (Michali, 2023).<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Availability<\/strong><\/p>\n\n\n\n<p>&nbsp;           The last of the three, availability ensures the accessibility to systems and data when needed.&nbsp; This is done by having backups in case the system goes down, disaster recovery systems in place to help regain access quickly and securely (Michali, 2023). Without these in place, it can lead to a period of time where all systems are down and thus, a loss of money. Loss of systems operation can happen at any time for a variety of reasons in this way there is a plan to get it back.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Authentication vs Authorization<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Authentication and Authorization are often mistaken for one another but serve two different purposes. Authentication verifies the identity of a user, system or device. In this way access to certain information is only to those who are verified to have it. Some examples of this include the use of passwords, one time pin (OTP) \u2013 which verifies a user\u2019s identity through their device, and biometrics which are unique to each user (Authentication vs. authorization: What\u2019s the difference?).&nbsp; Authorization is the access given to a user. Some examples of this includes role-based access control (RBAC), which specifies roles like admin, user and guest and attributebased access controls (ABAC), this uses aspects like location and time (Neray, 2024).<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>         In conclusion, the CIA Triad and its components of authentication and authorization are fundamentals to cybersecurity. The triad establishes a guide to make sure that data stays private, intact and accessible throughout the entire security process. While authentication and authorization work together to control access to this information by appropriate and secure methods. Recognizing and leveraging this is crucial to implementing and developing cybersecurity.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>References<\/strong><\/p>\n\n\n\n<p><em>Authentication vs. authorization: What\u2019s the difference?<\/em> OneLogin. (n.d.). <a href=\"https:\/\/www.onelogin.com\/learn\/authentication-vs-authorization\">https:\/\/www.onelogin.com\/learn\/authentication-vs-authorization<\/a> <\/p>\n\n\n\n<p>Michali. (2023, March 21). <em>What is the CIA triad?<\/em>. Check Point Software.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.checkpoint.com\/cyber-hub\/cyber-security\/what-is-it-security\/what-is-the-cia-triad\/\">https:\/\/www.checkpoint.com\/cyber-hub\/cyber-security\/what-is-it-security\/what-is-the-cia-triad\/<\/a><\/p>\n\n\n\n<p>Neray, G. (2024, February 22). The 10 types of authorization. RSS. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.osohq.com\/post\/ten-types-of-authorization\">https:\/\/www.osohq.com\/post\/ten-types-of-authorization<\/a><\/p>\n\n\n\n<p><em>What is the CIA triad and why is it important?<\/em>. Fortinet. (n.d.).<\/p>\n\n\n\n<p><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CIA triad \u2013 Confidentiality, Integrity, and Availability \u2013 is a foundational model used within Information security that acts as a guide to create security systems or methods. Authentication and Authorization are important components of this foundation. With authentication ensuring that only verified users can access systems and authorization, they only access resources they need&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/2025\/04\/06\/the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":27010,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[5,4],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/posts\/284"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/users\/27010"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":333,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/posts\/284\/revisions\/333"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}