CIA Flashcards
Confidentiality
Preserving authorized restrictions on information access and disclosure
Threats to confidentiality
Attacks on encryption
Social engineering
Key loggers
IOT
Controls to protect confidentiality
Encryption
Best practices
Integrity
Guarding against improper information modification or destruction this includes ensuring information is non repudiation and authenticity
Threats to integrity
Alterations of data
Code injections
Attack on encryption
Controls to protect integrity
Cryptography
Check sums
Message digest
Digital signatures
Access control
Availability
Ensuring timely and reliable access to and use of information by authorized users
Threats to availability
DDOS
Physical
System comprise
Staff
Application failures
Hardware
Controls to protect availability
IPS/IDS
patch management
Redundancy
SLA