The CIA Triad (sec +)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

What is “The CIA Triad” ?

foundational information security model that stands for Confidentiality, Integrity, and Availability

2
New cards

Confidentiality

Prevents disclosure of information to unauthorized individuals or systems

3
New cards

Integrity

Messages can’t be modified without detection

4
New cards

Availability

Systems and networks must be up and running

5
New cards

Encryption

Encodes messages so only certain people can read it

6
New cards

Access controls

Selectively restrict access to a resource

7
New cards

Hashing

Map data to an arbitrary length to data of a fixed length

8
New cards

Digital signatures

Takes a hash and encrypts it was a asymmetric encryption algorithm

9
New cards

Certificates

Used to identify devices or people to provide additional levels of integrity

10
New cards

Non-repudiation

Provides proof of integrity

11
New cards

Redundancy

Build services that will always be available

12
New cards

Fault Tolerance

systems will continue to run, even when failure occurs

13
New cards

Patching

Stability & Closing security holes