CIA/AIC Triad

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

confidentiality

Info provided in a private manner

2
New cards

Integrity

Data can’t be changed without detection

3
New cards

Availability

All systems are up and running at all times

4
New cards

Encryption

Allows data to be accessible to authorized personnel while being denied to unauthorized personnel.

Encodes data so only users with the proper key can view/use the data.

5
New cards

Access controls

Selectively restrict users access to a resource

6
New cards

TFA

Two Factor Authentication - Additional info such as a key generated by software is needed in addition to a user name and password

7
New cards

Hashing

Used in integrity to match your hash with sender’s

8
New cards

Digital Signature

Encrypts hash using an asymmetric algorithm (public/private key). Confirms authenticity of data and identity of sender.

9
New cards

Certificates

Used to identify devices/users

10
New cards

Availability

Redundancy/fault tolerance - Ensures systems will be available even if hardware fails

Patching - Ensure system stability and close security holes

11
New cards
12
New cards