1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Confidentiality
Implementation of this principle prevents unauthorized individuals or systems to access private information
Integrity
Implementation of this principle confirms that the information received was not changed
Availability
Implementation of this principle ensures that people have access to the data; the data must be available.
The CIA Triad
A set of principles that govern IT Secruity