THE CIA/AIC Triad 1.2 Flashcards

1
Q

Confidentiality

A
  • Prevent disclosure of information to unauthorized individuals or systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A
  • Messages cannot be modified.
  • Data is stored and transferred as intended.
  • Modifications to originally sent data will be identified.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AIC - Availability

A
  • Systems and networks must be kept up and running.
  • Ensures access to the data at all times.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The CIA/AIC Triad

A
  • The fundamentals of security.
  • Sometimes referred as the AIC triad
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ENCRYPTION

A
  • Encodes messages so only certain people can read it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does ACCESS CONTROLS ensure confidentiality?

A
  • Set limits on what someone has access to.
  • Select restrict access to a resource.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does TWO-FACTOR AUTHENTICATION ensure confidentiality?

A
  • Provides additional factors for authentication when accessing a system.
  • Additional confirmation before information is disclosed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is HASHING used to ensure integrity?

A
  • The person sending the data will send the recipient the data and a hash of the data.
  • Map data of an arbitrary length to data of a fixed length.
  • The recipient will perform a similar hashing function of the received data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can the application of DIGITAL SIGNATURES ensure integrity?

A
  • Mathematical scheme to verify the integrity of data.
  • Takes a Hash and encrypts with an asymmetrical algorithm. This ensures the data hasn’t changed and the confirms the intended recipient.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can the application of CERTIFICATES assist in integrity?

A
  • Combine with a digital signature to verify an individual.
  • Identifies devices and people to ensure intended recipient when transferring data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does NON-REPUDIATION ensure integrity?

A
  • Provides proof of integrity, can be asserted to be genuine.
  • Ensures the received information is from the originating party.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the REDUNDANCY ensure Availability?

A
  • Build services that will always be available and up and running.
  • This is combined with FAULT TOLERANCE.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the application of FAULT TOLERANCE ensure availability?

A
  • Systems will continue to run, even when a failure occurs.
  • When one systems fails or shuts down another will continue the services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the prevalence of PATCH when ensuring availability?

A
  • Provides stability of the system, and closes security holes that cold be potentially exploited.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly