501 Chapter 1 Flashcards
Describes a goal an organization wants to achieve
use case
____ prevents unauthorized disclosure of data
Confidentiality
____ scrambles the data
Encryption
____ helps ensure that only authorized persons can access the data through Identification, Authentication, Authorization
Access Controls
the practice of concealing a data on to another data
Steganography
the practice of making a data uninterpretable
Obfuscation
____ provides assurance that the data has not changed. Ensures that no one has modified, tampered with or corrupted the data.
Integrity
A ____ is a number created by a hashing algorithm
hash
commonly used in emails, provides nonrepudiation
digital signatures
an electronic password that allows a user to securely transfer data over the Internet using PKI
digital certificate
____ indicates that data and services are available when needed
Availability
adds duplication to critical systems and provides fault tolerance
redundancy
the common goal of redundancy is to remove
SPOF
SPOF stands for
Single Point of Failure
a redundancy technique: see RAID 1, RAID 5, RAID 10, allows a system to operate even if a disk fails
Disk Redundancies
a redundancy technique: see backup servers, remote servers
Server Redundancies
a redundancy technique: uses multiple servers to support a single service
Load Balancing
a redundancy technique: see alternate site or hot site where in the event of the original site is no longer capable of functioning
Site Redundancies
a site that is available 24/7 with employees
hot site
a site where employees need to go move to and start systems
cold site
a redundancy technique: see data backup, Grandfather-Father-Son backup
Backups
a redundancy technique: see UPS, Generator
Alternate Power
a redundancy technique: reduces outages from overheating
Cooling Systems
use a set of changes to update, improve or debug
Patching