{"id":282,"date":"2024-09-20T02:24:11","date_gmt":"2024-09-20T02:24:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/?p=282"},"modified":"2024-09-20T02:24:11","modified_gmt":"2024-09-20T02:24:11","slug":"the-cia-triad-guidance-for-information-security-in-an-organization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/2024\/09\/20\/the-cia-triad-guidance-for-information-security-in-an-organization\/","title":{"rendered":"The CIA Triad \u2013 Guidance for Information Security in an Organization"},"content":{"rendered":"\n<p>          The CIA Triad is used to ensure security systems are developed in such a way that the systems and the information that they hold are protected, and vulnerabilities are easy to fix (Fortinet). Information should be secure, trustworthy, and as accessible as possible.<br><\/p>\n\n\n\n<p>Confidentiality \u2013 Keep Information Safeguarded <br>           Confidentiality is ensuring data is secure. Roadblocks are essential to preventing people without proper authority from accessing PII, Personally Identifiable Information (IBM). This information can be used to commit theft of identify, especially if the stolen information consists of a combination of driver\u2019s license numbers, government issued ID numbers, and biometric identification (IBM). For this reason, it is imperative to safeguard this data by ensuring that personnel in an organization are savvy to social engineering methods such as phishing attempts. The users of accounts can authenticate or verify their identity by using something like two-factor authentication or biometric verification (Chai 2022). If one cannot authenticate themselves as being an authorized user, they will not gain access to the information and the roadblock will be successful.<\/p>\n\n\n\n<p><br>Integrity \u2013 Information Must be Trustworthy<br>           The integrity branch of the CIA Triad revolves around ensuring data is trustable and tamper free (Fortinet). Integrity can be ensured by enabling user access controls over files and version control to track who changes files and when those changes occur (Chai 2022). Hashing, encryption, and things like digital signatures are all things that can be used to keep files trustworthy and easy to be quickly identifiable if an unauthorized change is made (Fortinet).<\/p>\n\n\n\n<p><br>Availability \u2013 The Data is Readily Obtainable<br>           Data that is inaccessible is not useful data (Fortinet). Information should be regularly attainable for those who are authorized to view it (Chai 2022). This branch is best utilized by making sure proper system maintenance is scheduled consistently and completed as scheduled (Fortinet). Unpredictable events such as natural disasters can be mitigated by utilizing redundant servers or networks that come online when the primary system has been taken down (Fortinet). It is important that downtime is kept to a minimum to ensure critical information of an organization is as readily available as possible (Fortinet).<\/p>\n\n\n\n<p><br>Conclusion<br>           Proper safeguards must be in place and fully maintained. If any section of the CIA Triad is lacking, the information that is meant to be secure, available, and trustworthy, could very easily be tampered with, brought offline, or stolen in large quantities.<br><\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<ol>\n<li>Chai, W. (2022). What is the CIA Triad? Definition,&nbsp;Explanation, Examples. Retrieved 9\/15\/2024 from https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?jr=on<\/li>\n\n\n\n<li>Fortinet. (2024). What is the CIA Triad? Fortinet, Inc. Retrieved 9\/15\/2024 from https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad<\/li>\n\n\n\n<li>IBM. What is personally identifiable information (PII)? Retrieved 9\/15\/2024 from https:\/\/www.ibm.com\/topics\/pii#:~:text=Personally%20identifiable%20information%20(PII)%20is,email%20address%20or%20phone%20number.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad is used to ensure security systems are developed in such a way that the systems and the information that they hold are protected, and vulnerabilities are easy to fix (Fortinet). Information should be secure, trustworthy, and as accessible as possible. Confidentiality \u2013 Keep Information Safeguarded Confidentiality is ensuring data is secure. Roadblocks&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/2024\/09\/20\/the-cia-triad-guidance-for-information-security-in-an-organization\/\">Read More<\/a><\/div>\n","protected":false},"author":24660,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/users\/24660"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/posts\/282\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/timbarrett-cyse\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}