Chapter 1 Flashcards
Confidentiality
Prevents the unauthorized disclosure of data.
Encryption
Scrambles data to make it unreadable by unauthorized personnel.
PII
Personally identifiable information
Access controls
Identification, authentication, and authorization combined provide access controls and ensure only authorized personnel can access data.
Identification
User claims and identity with a unique username.
Authentication
Users prove their identity with authentication such as with a password.
Authorization
Access to a resource is granted or restricted by using an authorization methods such as permissions
Steganography
Hiding data within data.
Integrity
Provides assurances that the data has not been modified tampered with or corrupted. Hashing verifies integrity.
Digital signatures
Can verify the integrity of emails and files. Did you know signatures require certificates and also provide after authentication and non-repudiation.
Availability
Ensuring that data and services are available when needed.
Redundancy
Provides duplication have critical systems or data.
Fault tolerance
A system contains redundant components and can continue operating after experiencing a fault.
Patching
The process of applying software updates to applications to ensure availability and security.
Safety
Safety is a common goal of security. Examples include fencing, lighting, stronger locks, door access systems. Door locks typically fail open.