CIA Triad and Cryptography Vocabulary

0.0(0)
studied byStudied by 5 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering the CIA triad (confidentiality, integrity, availability) and related cryptography concepts such as encryption types, PKI, digital certificates, hashing, session keys, key exchange, integrity checks, and availability threats.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

CIA triad

A model consisting of confidentiality, integrity, and availability—the three core security goals for protecting information and networks.

2
New cards

Confidentiality

Data privacy: information is accessible only to authorized individuals; protected via encryption and authentication.

3
New cards

Integrity

Assurance that data has not been modified in storage or transit; verified using hashes to detect tampering.

4
New cards

Availability

Ensuring data and services are accessible when needed; supported by redundancy and fault tolerance.

5
New cards

Encryption

Process of converting plaintext into ciphertext to protect confidentiality.

6
New cards

Plaintext

Readable input data before encryption.

7
New cards

Ciphertext

Encrypted data produced by encryption; unreadable without decryption.

8
New cards

Symmetric encryption

Encryption that uses the same key to encrypt and decrypt data; fast but requires secure key distribution.

9
New cards

Asymmetric encryption

Encryption that uses a key pair (public and private keys) for encryption and decryption; enables secure key exchange.

10
New cards

Public key

The openly shared key in a key pair used to encrypt data intended for the key holder.

11
New cards

Private key

The secret key in a key pair used to decrypt data encrypted with the corresponding public key.

12
New cards

Public Key Infrastructure (PKI)

A framework for managing digital certificates and public keys to enable secure communications and trust.

13
New cards

Digital certificate

A certificate issued by a trusted authority that binds a public key to a domain or entity.

14
New cards

Session key

A temporary symmetric key used to encrypt data for a single session after a key exchange.

15
New cards

Hashing

Running data through a hash function to produce a hash digest that fingerprints the input for integrity checks.

16
New cards

Hash digest

The output of a hash function; used to verify data integrity by comparing sender and receiver hashes.

17
New cards

Key exchange

Process of establishing a shared session key, often using asymmetric cryptography.

18
New cards

Secure session

A session established with a handshake that results in a session key for symmetric encryption.

19
New cards

Key management

Generating, distributing, storing, rotating, and revoking encryption keys securely.

20
New cards

Denial of Service (DoS)

An attack that overwhelms a network or service, reducing availability.

21
New cards

Distributed Denial of Service (DDoS)

ADoS attack using many sources to flood a target, significantly impacting availability.

22
New cards

Redundancy

Having multiple components or pathways to maintain service availability.

23
New cards

High availability

System design aimed at operating with minimal downtime and continuous access to services.

24
New cards

Integrity breach

Unauthorized modification of data or records (e.g., changing prices or balances) compromising integrity.

25
New cards

Man-in-the-middle (MITM) attack

An on-path attack where an adversary intercepts and possibly alters communications between two parties.

26
New cards

Authentication

Verifying the identity of a user or system before granting access.

27
New cards

Certificate Authority (CA)

A trusted third party that issues and verifies digital certificates as part of PKI.

Explore top flashcards