Cybersecurity CIA triad

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

51 Terms

1
New cards

What is the CIA Triad?

A foundational cybersecurity model describing the three core goals: Confidentiality, Integrity, and Availability.

2
New cards

What does Confidentiality mean in networking?

Ensuring only authorized users can access information or systems.

3
New cards

What is the importance of confidentiality in networks?

Data is constantly transmitted and can be intercepted if not protected.

4
New cards

What are examples of data requiring confidentiality?

Passwords, personal information, grades, financial data, login tokens, employee/student records.

5
New cards

What is the most important confidentiality control?

Encryption.

6
New cards

What does encryption do?

Converts readable data into unreadable form.

7
New cards

Where is encryption used?

HTTPS, VPNs, WPA2/WPA3 Wi-Fi, SSH, encrypted backups.

8
New cards

What states does encryption protect data in?

Data in transit and data at rest.

9
New cards

How do passwords support confidentiality?

They prevent unauthorized logins.

10
New cards

What are examples of authentication?

Switch/router passwords, Wi-Fi passwords, MFA.

11
New cards

What are Access Control Lists (ACLs)?

Rules that control who can access a network or service.

12
New cards

Give an example of an ACL.

Only teachers' IP range can access the gradebook server.

13
New cards

What is network segmentation?

Splitting a network into parts to restrict access.

14
New cards

How do VLANs protect confidentiality?

They prevent unauthorized users from reaching sensitive network areas.

15
New cards

Give an example of VLAN usage.

Students on VLAN 10, teachers on VLAN 20.

16
New cards

What is port security?

Prevents unauthorized devices from connecting to switch ports.

17
New cards

What are common confidentiality attacks?

Packet sniffing, ARP spoofing, MITM, phishing, password attacks.

18
New cards

What is an example of a confidentiality failure?

Capturing unencrypted login credentials on open Wi-Fi.

19
New cards

How can Wi-Fi confidentiality failures be fixed?

WPA3 encryption and HTTPS.

20
New cards

What does Integrity mean?

Ensuring data is accurate, unchanged, and trustworthy.

21
New cards

What is the importance of integrity?

Altered data makes systems unreliable.

22
New cards

What are examples of integrity violations?

Changing grades, packet modification, routing table changes, fake ARP messages.

23
New cards

What are hashing and checksums used for?

Verifying data has not changed.

24
New cards

What are examples of integrity verification?

TCP checksums, SHA-256 hashes.

25
New cards

What are digital signatures used for?

Verifying authenticity of software or updates.

26
New cards

How do access controls protect integrity?

They prevent unauthorized changes.

27
New cards

What are integrity protection tools?

DAI, DHCP Snooping, secure routing, log monitoring.

28
New cards

What does DHCP Snooping prevent?

Rogue DHCP servers.

29
New cards

What does Dynamic ARP Inspection prevent?

ARP spoofing.

30
New cards

What are common integrity attacks?

MITM alteration, ARP poisoning, DNS spoofing, malware.

31
New cards

What is an example of an integrity failure?

Rogue DHCP server changing gateway information.

32
New cards

What control stops rogue DHCP?

DHCP Snooping.

33
New cards

What does Availability mean?

Ensuring systems and data are accessible when needed.

34
New cards

What is the importance of availability?

Secure data is useless if systems are down.

35
New cards

What is redundancy?

Using extra devices or links to prevent downtime.

36
New cards

What are examples of redundancy?

Backup switches, routers, links, RAID storage.

37
New cards

What are backups used for?

Restoring lost or damaged data.

38
New cards

What does a UPS do?

Keeps systems running during power outages.

39
New cards

What is DDoS protection?

Prevents traffic floods that overwhelm networks.

40
New cards

How does segmentation help availability?

Problems in one VLAN don't affect the entire network.

41
New cards

What is load balancing?

Distributing traffic across multiple servers.

42
New cards

What is automatic failover?

A backup system takes over if the primary fails.

43
New cards

What are common availability attacks?

DDoS, broadcast storms, STP loops, cable damage, power outages.

44
New cards

What is an example of an availability failure?

Broadcast storm taking down a network.

45
New cards

How can broadcast storms be fixed?

Storm control and proper STP configuration.

46
New cards

Intercepted unencrypted Wi-Fi traffic affects which CIA element?

Confidentiality.

47
New cards

Rogue DHCP server affects which CIA element?

Integrity.

48
New cards

Broadcast storm affects which CIA element?

Availability.

49
New cards

Which control protects confidentiality and integrity?

Encryption.

50
New cards

Which controls protect availability?

UPS, redundancy, STP, backups.

51
New cards

VLANs primarily support which CIA element?

Confidentiality (and partially availability).

Explore top flashcards

APUSH World War 2
Updated 1076d ago
flashcards Flashcards (163)
Los Viajes
Updated 1158d ago
flashcards Flashcards (69)
Science 3/28/23
Updated 1027d ago
flashcards Flashcards (31)
Avancemos 3 3.1
Updated 1053d ago
flashcards Flashcards (50)
Population
Updated 631d ago
flashcards Flashcards (37)
APUSH World War 2
Updated 1076d ago
flashcards Flashcards (163)
Los Viajes
Updated 1158d ago
flashcards Flashcards (69)
Science 3/28/23
Updated 1027d ago
flashcards Flashcards (31)
Avancemos 3 3.1
Updated 1053d ago
flashcards Flashcards (50)
Population
Updated 631d ago
flashcards Flashcards (37)