CIA Triad Flashcards
A hospital only allows authorized healthcare personnel within one department access to patient Personal Identifiable Information. When employees move to another department, that access is revoked.
Confidentiality
A technology firm maintains an alternate site that is running 24/7, and operations can be moved to this location in the event of a major disaster.
Availability
Employees need to have key cards to enter their company offices.
Confidentiality
Only authorized personnel at a company have write access to certain files. All other employees have only read access to these files.
Confidentiality
A company hashes its data files to monitor whether information has been tampered with.
Integrity
A company employs redundant servers, which means that these systems are duplicated, and in the event of a malfunction, one server will fail over to other.
Availibilty
A company’s network infrastructure uses load balancers which will distribute the “load” of tasks such as file requests and data routing to a variety of servers, thereby ensuring that no single device is overburdened.
Availibilty
A company employee accidentally sends an email containing sensitive financial information to the wrong recipient.
Confidentiality
A hacker uses a man-in-the-middle attack to intercept wireless traffic from users.
Confidentiality
A hacker was able to crack a hashed message and change its contents.
Integrity
A hacker launched a DDoS attack which flooded a website with unwanted traffic from several computers and took the site offline.
Availability
An online retailer uses hashing algorithms to verify that the product prices displayed on their website have not been tampered with.
Integrity
A cloud service provider experiences a power outage at one of its data centers. They have redundant systems in place to ensure that services remain available to clients without interruption.
Availability
An e-commerce platform uses checksums to verify that files downloaded by users have not been corrupted or altered during the transfer process.
Integrity
A law firm stores its legal documents in a secure, encrypted cloud storage system. Only authorized personnel with the correct decryption keys can access these documents. A bank uses multi-factor authentication to ensure that only account holders can access their online banking information protecting it from unauthorized access.
Confidentiality