Understanding Core Security Goals Flashcards
What is the CIA model?
Confidentiality
Integrity
Accessability
Confidentiality
Prevents unauthorized access to information
Encryption
Scrambles data to make it unreadable to unauthorized viewers
What are the access controls (IAA)
Identification: identity of user
Authentication: credentials of user.
Authorization: data user has been given permission to access
Integrity
Verifies that data has not been altered. Typically by using hash algorithms.
Availability
Data and services are available when needed
Redundancy
backup of critical systems to provide fault tolerance
Disk redundancy
duplicate disk drives
Examples:RAID-1 (mirroring)
RAID-5 (striping with parity)
RAID-10 (striping with a mirror)
Disk redundancy
duplicate disk drives
Examples:
RAID-1 (mirroring)
RAID-5 (striping with parity)
RAID-10 (striping with a mirror)
Server Redundancy
Failover clusters of servers to redundant servers
Network redundancy
Load balancing using multiple server clusters and NIC cards
Scalability
the ability to manually add resources when needed
elasticity
a system that automatically scales resources up or down as needed
Patching
Software code released by software vendor to resolve known issues
Fault Tolerance
increases the availability of system resources