OSG-CH1 Flashcards
prevent or minimize unauthorized access to data.
Confidentiality
protection prevents unauthorized alterations of data
Integrity
functional and allows authorized users to gain authorized access
Availability
Disclosure, alteration, and destruction make up the DAD Triad
Failures of the CIA Triad
Overprotecting confidentiality
result in a restriction of availability.
Overprotecting integrity
result in a restriction of availability.
Overproviding availability
result in a loss of confidentiality and integrity
Providing pieces of information such as involve typing in a username; swiping a smartcard; waving a proximity device; speaking a phrase; or positioning your face, hand, or finger for a camera or scanning device
Identification
requires the subject to provide additional information that corresponds to the identity they are claiming
Authentication
ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity.
Authorization
Log files provide a trail for re-creating the history of an event, intrusion, or system failure. needed to detect malicious actions by subjects, attempted intrusions, and system failures and to reconstruct events, provide evidence for a prosecution, and produce problem reports and analysis
Auditing
Is established by linking an individual to the activities of an online identity through the security services and mechanisms of auditing, authorization, authentication
Accountability
use of multiple controls in a series. No one control can protect against all possible threats.
Defense in depth (layering)
used for efficiency. Similar elements are put into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective. the concept is used when classifying objects or assigning roles to subjects.
Abstraction
Type of Steganography; ensures that data existing at one level of security is not visible to processes running at different security levels. positioning data so that it is not viewable or accessible to an unauthorized subject.
Data hiding