1/10
Flashcards based on the CIA triad and its significance in IT security, covering key concepts like confidentiality, integrity, and availability.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
CIA Triad
A conceptual model that outlines the three core principles of IT security: Confidentiality, Integrity, and Availability.
Confidentiality
The principle that ensures private information is not disclosed to unauthorized individuals.
Integrity
The assurance that data sent from one party to another is received exactly as intended, without alterations.
Availability
The principle that ensures systems and data are accessible to authorized users whenever needed.
Encryption
A method used to secure data by converting it into a coded format that can only be read by someone who has the key to decrypt it.
Access Controls
Security measures that restrict access to systems or information to authorized users only.
Hashing
A process of converting data into a fixed-size string of characters, which is typically a hash value, to ensure data integrity.
Digital Signature
A mathematical scheme that verifies the authenticity and integrity of a message or document by using asymmetric encryption.
Non-repudiation
A principle ensuring that a sender cannot deny sending a message and that the receiver cannot deny receiving it.
Fault Tolerance
The capability of a system to continue functioning even when one or more of its components fail.
Patching
The process of updating software to fix vulnerabilities and improve security.