CIA Triad (SEC+ 1.2) (LEARNED *PRACTICE A LIL MORE*)

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:23 PM on 4/13/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

CIA Triad

the fundamentals of security, also called AIC triad

2
New cards

C.I.A

Confidentiality, Integrity, Availability

3
New cards

Confidentiality

Certain info should only be known to certain people (Ex. encryption)

4
New cards

Encryption

encode messages so only certain people can read it

5
New cards

Access Controls

Selectively restrict access to a resource

6
New cards

Two factor Authentication

additional confirmation before info is disclosed

7
New cards

access control and 2FA are examples of what?

They are examples of Encryption

8
New cards

Integrity

Data is stored and transferred as intended

9
New cards

Digital Signature

mathematical scheme to verify the integrity of data

10
New cards

Certificates

combine with a digital signature to verify an individual

11
New cards

Hashing, digital signatures, and certificates are apart of what CIA triad?

They are examples of Integrity

12
New cards

Availability

Information is accessible to authorized users (always at your fingertips)

13
New cards

Redundancy

having backups / services that will always be available

14
New cards

Fault tolerance

system will continue to run even when a failure occurs

15
New cards

Patching

close security holes; stability

16
New cards

Redundancy, fault tolerance, and patching are examples of what CIA triad?

They are examples of Availability