1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is “The CIA Triad” ?
foundational information security model that stands for Confidentiality, Integrity, and Availability
Confidentiality
Prevents disclosure of information to unauthorized individuals or systems
Integrity
Messages can’t be modified without detection
Availability
Systems and networks must be up and running
Encryption
Encodes messages so only certain people can read it
Access controls
Selectively restrict access to a resource
Hashing
Map data to an arbitrary length to data of a fixed length
Digital signatures
Takes a hash and encrypts it was a asymmetric encryption algorithm
Certificates
Used to identify devices or people to provide additional levels of integrity
Non-repudiation
Provides proof of integrity
Redundancy
Build services that will always be available
Fault Tolerance
systems will continue to run, even when failure occurs
Patching
Stability & Closing security holes