Ch 1. Mastering the Basics Flashcards
Presents the basics for understanding security.
Use Case
used to identify and clarify requirements to achieve a goal
Confidentiality
prevent the unauthorized disclosure of data
Encryption
scrambles data to make it unreadable by unauthorized personnel
What are the three elements of Access Controls?
Identification, Authentication, Authorization
Steganography
practice of hiding data within data
What are the three methods of Confidentiality?
Encryption, Access Controls, Steganography
Integrity
provides assurances that data has not changed
Hash
a number created by a executing a hashing algorithm against data
Digital Signature
use certificates and a Public Key Infrastructure to verify integrity and provide authentication and N-R
What are the two methods of Integrity?
Hashing and Digital Signatures
Availability
indicates that data and services are available when needed
Redundancy
adds duplication to critical systems and provides fault tolerance
Patch
code that resolves software bugs
What are the two methods of Availability?
Redundancy and Patching
Risk
the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss