1/35
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Confidentiality
Only the people you picked get to read it.
Integrity
What’s stored/ sent is exactly what you meant.
Availability
It’s there when the good guys need it.
Non-repudiation
You can’t say you didn’t do that; digital receipts & signatures prove it.
NIST CSF
5-step lifecycle—Identify, Protect, Detect, Respond, Recover.
Gap analysis
Spreadsheet of 'what we have' vs 'what the framework says we need'.
AAA (IAM)
Identify → Authenticate → Authorize → Account.
CIA triad
A model that involves Confidentiality, Integrity, and Availability.
Identify
The first function of the NIST CSF, focusing on asset and risk identification.
Protect
The second function of the NIST CSF, implementing controls to mitigate risks.
Detect
The third function of the NIST CSF, identifying unauthorized access or incidents.
Respond
The fourth function of the NIST CSF, aiming to take action during a security incident.
Recover
The fifth function of the NIST CSF, restoring normal operations after a security incident.
Authentication
The AAA stage that proves identity, typically through passwords or tokens.
Authorization
The AAA stage that determines what resources are accessible to the user.
Accounting
The AAA stage that tracks user activities and audit logs.
CCTV recording
A non-repudiation measure that provides evidence of access to secure areas.
RBAC
Role-Based Access Control; a method of restricting system access based on roles.
ABAC
Attribute-Based Access Control; a method of controlling access based on attributes.
Confidentiality
Only the people you picked get to read it.
Integrity
What’s stored/ sent is exactly what you meant.
Availability
It’s there when the good guys need it.
Non-repudiation
You can’t say you didn’t do that; digital receipts & signatures prove it.
NIST CSF
5-step lifecycle—Identify, Protect, Detect, Respond, Recover.
Gap analysis
Spreadsheet of 'what we have' vs 'what the framework says we need'.
AAA (IAM)
Identify → Authenticate → Authorize → Account.
CIA triad
A model that involves Confidentiality, Integrity, and Availability.
Identify
The first function of the NIST CSF, focusing on asset and risk identification.
Protect
The second function of the NIST CSF, implementing controls to mitigate risks.
Detect
The third function of the NIST CSF, identifying unauthorized access or incidents.
Respond
The fourth function of the NIST CSF, aiming to take action during a security incident.
Recover
The fifth function of the NIST CSF, restoring normal operations after a security incident.
Authentication
The AAA stage that proves identity, typically through passwords or tokens.
Authorization
The AAA stage that determines what resources are accessible to the user.
Accounting
The AAA stage that tracks user activities and audit logs.
A non-repudiation measure that provides evidence of access to