2 Fundamentals of Security:Fundamentals Flashcards
Protecting data and information from unauthorized access, modification, disruption, disclosure and destruction
Information Security
Protecting systems that hold and process critical data
Information Systems Security
CIA Triad
Confidentiality, Integrity and Availability
Ensures information is accessible only th authorized personnel
confidentiality
Ensures data remains accurate and unaltered
Integrity
Ensures information and resources are accessible when needed
availability
What word comes to mind when you think of confidentiality
encryption
What word comes to mind when you think of integrity
checksums
What word comes to mind when you think of availability
redundancy
Guarantees that an action or event cannot be denied by the involved parties
non-repudiation
What word comes to mind when you think of non-repudiation?
digital signatures
What are the two extensions of the CIA Triad and are referred as the CIANA Pentagon
non-repudiation and authenticaion
Triple A’s of security
authentication, authorization and accounting
Verifying the identity of a user system
authentication
Determining actions or resources an authenticated user can access
authorization