CIA Triad in IT Security

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/10

flashcard set

Earn XP

Description and Tags

Flashcards based on the CIA triad and its significance in IT security, covering key concepts like confidentiality, integrity, and availability.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

CIA Triad

A conceptual model that outlines the three core principles of IT security: Confidentiality, Integrity, and Availability.

2
New cards

Confidentiality

The principle that ensures private information is not disclosed to unauthorized individuals.

3
New cards

Integrity

The assurance that data sent from one party to another is received exactly as intended, without alterations.

4
New cards

Availability

The principle that ensures systems and data are accessible to authorized users whenever needed.

5
New cards

Encryption

A method used to secure data by converting it into a coded format that can only be read by someone who has the key to decrypt it.

6
New cards

Access Controls

Security measures that restrict access to systems or information to authorized users only.

7
New cards

Hashing

A process of converting data into a fixed-size string of characters, which is typically a hash value, to ensure data integrity.

8
New cards

Digital Signature

A mathematical scheme that verifies the authenticity and integrity of a message or document by using asymmetric encryption.

9
New cards

Non-repudiation

A principle ensuring that a sender cannot deny sending a message and that the receiver cannot deny receiving it.

10
New cards

Fault Tolerance

The capability of a system to continue functioning even when one or more of its components fail.

11
New cards

Patching

The process of updating software to fix vulnerabilities and improve security.