Practice Exam Flashcards
Integrity
Used to verify that data has not been modified, tampered with, or corrupted. Loss of integrity indicates the data is different & can occur through unauthorized or unattended changes.
Hashing algorithms such as MDD5, HMAC, or SHA1 can calculate hashes to verify integrity.
Confidentiality
- Ensures that data is only viewable by authorized users.
- Encryption also enforces confidentiality.
Other elements that enforce confidentiality: authentication, access control methods, physical security, and permissions
Availability
Ensures that systems are up and operational when needed and often addresses single points of failure. You can increase availability by adding fault tolerance and redundancies such as RAID, clustering, backups, and generators. HVAC systems also increase availability.