1/4
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
confidentiality, integrity, avaliblity
three parts of the CIA triad
firewalls, access controls, and encryption
three examples of things that enable confidentality
hashing and integrity monitoring
two ways to enable integrirty
fault tolerance, backups, and clustering
two examples of that enable availabilty
they confirm that the message came from the actual sender
how do digital signatures provide nonrepudiation