1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Defense in Depth
Multiple lines of defense for fault tolerance
CIA
Confidentiality
Integrity
Availability
Confidentiality
Authorized users only have appropriate rights
Ex:
Encryption
Access Control
Integrity
Ensure accuracy and trustworthiness of info
Ex:
Hashing, Checksums
Receiver → Decrypt Calculation
Digital Signing / Certificates
Availability
When needed, data is available
Redundency
Failover
Non-Repudiation
No one can deny the authenticity of a signature (Key)
Proof that info was from the sending party