THE CIA/AIC Triad 1.2 Flashcards
1
Q
Confidentiality
A
- Prevent disclosure of information to unauthorized individuals or systems.
2
Q
Integrity
A
- Messages cannot be modified.
- Data is stored and transferred as intended.
- Modifications to originally sent data will be identified.
3
Q
AIC - Availability
A
- Systems and networks must be kept up and running.
- Ensures access to the data at all times.
4
Q
The CIA/AIC Triad
A
- The fundamentals of security.
- Sometimes referred as the AIC triad
5
Q
ENCRYPTION
A
- Encodes messages so only certain people can read it.
6
Q
How does ACCESS CONTROLS ensure confidentiality?
A
- Set limits on what someone has access to.
- Select restrict access to a resource.
7
Q
How does TWO-FACTOR AUTHENTICATION ensure confidentiality?
A
- Provides additional factors for authentication when accessing a system.
- Additional confirmation before information is disclosed.
8
Q
How is HASHING used to ensure integrity?
A
- The person sending the data will send the recipient the data and a hash of the data.
- Map data of an arbitrary length to data of a fixed length.
- The recipient will perform a similar hashing function of the received data.
9
Q
How can the application of DIGITAL SIGNATURES ensure integrity?
A
- Mathematical scheme to verify the integrity of data.
- Takes a Hash and encrypts with an asymmetrical algorithm. This ensures the data hasn’t changed and the confirms the intended recipient.
10
Q
How can the application of CERTIFICATES assist in integrity?
A
- Combine with a digital signature to verify an individual.
- Identifies devices and people to ensure intended recipient when transferring data.
11
Q
How does NON-REPUDIATION ensure integrity?
A
- Provides proof of integrity, can be asserted to be genuine.
- Ensures the received information is from the originating party.
12
Q
How does the REDUNDANCY ensure Availability?
A
- Build services that will always be available and up and running.
- This is combined with FAULT TOLERANCE.
13
Q
How does the application of FAULT TOLERANCE ensure availability?
A
- Systems will continue to run, even when a failure occurs.
- When one systems fails or shuts down another will continue the services.
14
Q
What is the prevalence of PATCH when ensuring availability?
A
- Provides stability of the system, and closes security holes that cold be potentially exploited.