1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
confidentiality
only authorized invididuals can access data
integrity
ensuring data hasn’t beend modified or corrupted
availability
ensuring resources are accesible to users
confidentaility
what part of the CIA triad is breached when an attacker gains unauthorized access to system?
integrity
what part of the triad is breached when an attacker alters data without authorization?
integrity
what part of the CIA triad is breached when a power spike alters data?
avaliability
what part of the CIA triad is breached during a DOS attack?
availability
what part of the CIA triad is breached when a fire destroys a data center?
nonrepudation
being unable to deny an action
digitial signatures
one example of something that provides nonrepudiation
confidentiality
what part of the CIA triad do firewalls enable?
confidentiality
what part of the CIA triad do access controls enable?
confidentiality
what function of the CIA triad does encryption enable?
integrity
what function of the CIA triad does hashing enable?
availability
what function of the CIA triad does fault tolerance enable?
availability
what part of the CIA triad do backups enable?
availability
what part of the CIA triad does clustering enable?
integrity
what part of the CIA triad does integrity monitoring enable?