1/24
Part 2 of Lesson 1
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does the CIA Triad stand for in IT security?
Confidentiality, Integrity, and Availability.
Why is the CIA Triad sometimes called the AIC Triad?
To avoid confusion with the U.S. Central Intelligence Agency.
What is the main challenge in balancing confidentiality and availability?
Ensuring data is accessible to authorized users while preventing unauthorized access.
What is the goal of confidentiality in IT security?
To protect sensitive data from unauthorized access.
How does encryption support confidentiality?
It makes intercepted data unreadable to unauthorized users.
What are access controls?
Restrictions based on user roles or departments to limit data access.
What is Multi-Factor Authentication (MFA)?
A method requiring multiple credentials to access systems, enhancing confidentiality.
What does integrity ensure in data transmission?
That data is accurate and unchanged from sender to recipient.
How does hashing verify data integrity?
By comparing hash values before and after transmission
What is a digital signature?
An encrypted hash using the sender’s private key to verify data integrity and authenticity.
What role do certificates play in integrity?
They authenticate devices or users during communication.
What is nonrepudiation?
Proof that the sender cannot deny sending the data, crucial for legal accountability.
What does availability ensure in IT systems?
That authorized users can access data and systems when needed.
What is fault tolerance?
System design that allows operation to continue despite component failures.
Why is system maintenance and patching important?
It prevents failures and closes security vulnerabilities.
What should be considered in system design for availability?
Balancing security with continuous uptime.
What techniques support confidentiality?
Encryption, Access Controls, MFA.
What techniques support integrity?
Hashing, Digital Signatures, Certificates, Nonrepudiation.
What techniques support availability?
Fault Tolerance, Maintenance, Patching.
What is encryption?
Transforming data into a coded format unreadable by unauthorized users.
What is hashing?
Creating a fixed-size string from data to verify integrity.
What is a digital signature?
An encrypted hash confirming data integrity and sender authenticity.
What are access controls?
Policies restricting who can view or modify data.
What is fault tolerance?
System design allowing continuous operation despite failures
What is nonrepudiation?
Guarantee that a sender cannot deny the authenticity of their message.