CIA TRIAD

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

What does C in CIA stand for?

Confidentiality — ensuring data is only accessible to authorized individuals.

2
New cards

What does I in CIA stand for?

Integrity — ensuring data remains unchanged during transfer or storage.

3
New cards

What does A in CIA stand for?

Availability — ensuring systems and data are accessible when needed.

4
New cards

What is the goal of confidentiality?

To keep sensitive data from being disclosed to unauthorized users.

5
New cards

What are examples of confidentiality controls?

Encryption, access controls, MFA, VPNs.

6
New cards

What is the role of encryption in confidentiality?

It protects data by making it unreadable to unauthorized parties.

7
New cards

What is the goal of integrity?

To maintain data accuracy, consistency, and trustworthiness.

8
New cards

What technology ensures data integrity?

Hashing.

9
New cards

What are examples of integrity violations?

Data tampering, unauthorized modifications, transmission errors

10
New cards

How do digital signatures support integrity?

They verify data has not been altered and authenticate the sender.

11
New cards

What is the goal of availability?

To ensure resources and services are available when needed.

12
New cards

What supports availability in a secure environment?

Redundancy, backups, load balancing, UPS systems, patching.

13
New cards

What is a common threat to availability?

Denial-of-service (DoS) attacks.

14
New cards

What’s a common challenge between confidentiality and availability?

Strong security may reduce ease of access for authorized users.

15
New cards

Why is balancing all three CIA principles important?

It ensures data is secure, accurate, and accessible — a complete security posture.