09. CIA - Confidentiality, Integrity, Availability Flashcards

1
Q

Confidentiality, Integrity, Availability

Confidentiality

A

Ensure no on unauthorised can access the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality, Integrity, Availability

Integrity

A

Ensure data has not been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality, Integrity, Availability

Availability

A

Ensure authorized people can access data when they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality, Integrity, Availability

CONFIDENTIALITY:
Threats

A
  1. Attacks on encryption
  2. Social engineering
  3. Key Loggers
  4. IoT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality, Integrity, Availability

CONFIDENTIALITY:
We use

A
  1. Encryption - data at rest
  2. Secure Transport Protocols - data in motion
  3. Best Practices - data in use
  4. Secure protection

  • Secure protection = strong passwords, MFA, masking, access control, neet to know, least privilege
  • Best practices = Clean desk, no shoulder surfing, screen view protector, PC locking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality, Integrity, Availability

INTEGRITY:
Threats

A
  1. Alterations to data
  2. Code injection
  3. Attacks on your encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality, Integrity, Availability

INTEGRITY:
We Use

A
  1. Cryptography
  2. Checksums
  3. Message Digests (MD5 Hashing, SHA1, SHA2)
  4. Digital Signatures
  5. Access Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality, Integrity, Availability

AVAILABILITY;
Threats

A
  1. Malicious Attacks (DDoS, Physical, system compromise)
  2. Application Failure (code error)
  3. Component failure (hardware)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality, Integrity, Availability

AVAILABILITY;
We Use

A
  1. IPS/IDS
  2. Patch Management
  3. Redundancy, HA, Failover
  4. SLAs - Uptime targets

ROI - Return on Investment

  • Need to factor in fiscal elements to redundancy
  • What priority are systems, is it worth the cost of making them ultra HA or redundent?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality, Integrity, Availability

CIA Opposites

A

Confidentiality ==> Disclosure
Integrity ==> Alteration
Availability ==> Destruction

CIA ==> DAD

  • REMEMBER American DAD - CIA agent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly