1. Mastering Security Basics Flashcards
Use Case
a goal that an organization wants to achieve.
CIA Security Triad
Confidentiality, Integrity, and Availability
Confidentiality
prevents the unauthorized disclosure of data.
Encryption
scrambles data to make it unreadable by unauthorized personnel.
What are the three Access Controls?
identification, authentication, authorization
Steganography
practice of hiding data in data.
Integrity
provides assurances that data has not changed.
Hash
a number created by executing a hashing algorithm against data, such as a file or a message.
The 3 MAC’s
media access control
mandatory access control
message authentication code
What’s that acronym?
PKI
public key infrastructure
Availability
idicates that data and services are available when needed.
Risk
is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.
Vulnerability
is a weakness
Threat
is any circumastance or event that has the potential to compromise confidentiality
Security Incident
is an adverse event or series of events that can negatively affect the condifentiality, integrity, or availability of an organization’s informatation technology systems and data