{"id":42,"date":"2025-04-29T01:03:26","date_gmt":"2025-04-29T01:03:26","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cvald006\/?page_id=42"},"modified":"2025-04-29T02:18:22","modified_gmt":"2025-04-29T02:18:22","slug":"the-cia-triad","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cvald006\/the-cia-triad\/","title":{"rendered":"The CIA Triad"},"content":{"rendered":"\n<p>Cali Valdivieso<br>23 February 2025<br>CYSE 200T<\/p>\n\n\n\n<p>The CIA triad consists of confidentiality, integrity, and, availability. The CIA triad is the blueprint organizations use to create new policies. It allows them to have checks and balances to make sure a policy will be able to effective. Authentication and authorization are steps within the triad that will keep a company\u2019s information private and secure.<br>Confidentiality is how an organization decides who will have access and the steps that are necessary for them to access the information. This can be exemplified by having employees create strong passwords or before viewing classified information, have them go through multiple authentication steps. Integrity is very important within this triad. It calls for the organization to take steps to keep its data up-to-date and safe from any unauthorized changes. This can be shown through companies having blocks on editing documents or having a backup of all the files. Availability calls for the database to be able to output files and other information when it is searched for. This can be difficult as some crashes can be out of the organization\u2019s hands. Organizations can help combat this by keeping their systems up to date and having plans for disaster recovery.Authorization is described as \u201cthe process of determining whether an entity (a device or a user) can access resources\u201d(Kim &amp; Lee,2017). This can be further exemplified by a student having to use the duo-lingo application to approve it is them trying to access their Old Dominion<br>University portal or else they will not be allowed to log on. Authentication is \u201ca prerequisite for authorization\u201d (Kim &amp; Lee, 20017). For someone to even log in to a website they had to have been given the okay to have the account. This can be exemplified through Old Dominion University creating and id number for a student to use and create their login. The use of the CIA triad, authorization, and, authentication are vital in an organization to keep information relevant and guarded. These things should constantly be studied and determined if they need to be updated.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>References<br>H. Kim and E. A. Lee, &#8220;Authentication and Authorization for the Internet of Things,&#8221; in IT<br>Professional, vol. 19, no. 5, pp. 27-33, 2017, doi: 10.1109\/MITP.2017.3680960.<br>keywords: {Authentication;Authorization;Browsers;Base<br>stations;Bitcoin;Cryptocurrency;Internet of Things;Trust management;Internet of<br>Things;network-level security;access<br>control;authorization;authentication;centralization;decentralization;security;privacy;distri<br>buted systems},https:\/\/ieeexplore.ieee.org\/abstract\/document\/8057722\/authors#authors<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cali Valdivieso23 February 2025CYSE 200T The CIA triad consists of confidentiality, integrity, and, availability. The CIA triad is the blueprint organizations use to create new policies. It allows them to have checks and balances to make sure a policy will be able to effective. Authentication and authorization are steps within the triad that will keep &hellip; <a href=\"https:\/\/student.wp.odu.edu\/cvald006\/the-cia-triad\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The CIA Triad<\/span><\/a><\/p>\n","protected":false},"author":30325,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/pages\/42"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/users\/30325"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":3,"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":88,"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/pages\/42\/revisions\/88"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}