CIA Triad Overview Cards: Lesson 1.2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

Part 2 of Lesson 1

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

What does the CIA Triad stand for in IT security?

Confidentiality, Integrity, and Availability.

2
New cards

Why is the CIA Triad sometimes called the AIC Triad?

To avoid confusion with the U.S. Central Intelligence Agency.

3
New cards

What is the main challenge in balancing confidentiality and availability?

Ensuring data is accessible to authorized users while preventing unauthorized access.

4
New cards

What is the goal of confidentiality in IT security?

To protect sensitive data from unauthorized access.

5
New cards

How does encryption support confidentiality?

It makes intercepted data unreadable to unauthorized users.

6
New cards

What are access controls?

Restrictions based on user roles or departments to limit data access.

7
New cards

What is Multi-Factor Authentication (MFA)?

A method requiring multiple credentials to access systems, enhancing confidentiality.

8
New cards

What does integrity ensure in data transmission?

That data is accurate and unchanged from sender to recipient.

9
New cards

How does hashing verify data integrity?

By comparing hash values before and after transmission

10
New cards

What is a digital signature?

An encrypted hash using the sender’s private key to verify data integrity and authenticity.

11
New cards

What role do certificates play in integrity?

They authenticate devices or users during communication.

12
New cards

What is nonrepudiation?

Proof that the sender cannot deny sending the data, crucial for legal accountability.

13
New cards

What does availability ensure in IT systems?

That authorized users can access data and systems when needed.

14
New cards

What is fault tolerance?

System design that allows operation to continue despite component failures.

15
New cards

Why is system maintenance and patching important?

It prevents failures and closes security vulnerabilities.

16
New cards

What should be considered in system design for availability?

Balancing security with continuous uptime.

17
New cards

What techniques support confidentiality?

Encryption, Access Controls, MFA.

18
New cards

What techniques support integrity?

Hashing, Digital Signatures, Certificates, Nonrepudiation.

19
New cards

What techniques support availability?

Fault Tolerance, Maintenance, Patching.

20
New cards

What is encryption?

Transforming data into a coded format unreadable by unauthorized users.

21
New cards

What is hashing?

Creating a fixed-size string from data to verify integrity.

22
New cards

What is a digital signature?

An encrypted hash confirming data integrity and sender authenticity.

23
New cards

What are access controls?

Policies restricting who can view or modify data.

24
New cards

What is fault tolerance?

System design allowing continuous operation despite failures

25
New cards

What is nonrepudiation?

Guarantee that a sender cannot deny the authenticity of their message.

Explore top flashcards

AP Calc Derivatives
Updated 392d ago
flashcards Flashcards (21)
Buda Vocab
Updated 255d ago
flashcards Flashcards (21)
Patho Final
Updated 309d ago
flashcards Flashcards (138)
9
Updated 382d ago
flashcards Flashcards (80)
Endeavor - All Codes
Updated 52d ago
flashcards Flashcards (182)
AP Calc Derivatives
Updated 392d ago
flashcards Flashcards (21)
Buda Vocab
Updated 255d ago
flashcards Flashcards (21)
Patho Final
Updated 309d ago
flashcards Flashcards (138)
9
Updated 382d ago
flashcards Flashcards (80)
Endeavor - All Codes
Updated 52d ago
flashcards Flashcards (182)