Chapter 1 Flashcards
(88 cards)
Use Case
Describes a goal than an organization wants to achieve.
Actors
A person
Precondition
Must occur before the process can start
Trigger
Starts the use case
Postcondition
Occurs after the actor triggers the process
Normal Flow
Lists each step in specific order
Confidentiality
Prevents the unauthorized disclosure of data
Encryption
Scrambles data to make it unreadable
PII
Personally Identifiable Information
Access Controls
Identification, authentication, and authorization.
Identification
User claimed identity
Authentication
Users prove their identity
Authorization
Grant or restrict access to resources after authentication.
Steganography
Hiding data within data
Obfuscation
METHOD to attempt to make something unclear or difficult.
Integrity
Provides assurances that data has not changed.
Hashing
A number created by an algorithm against data to ensure integrity.
Hashing Algorithms
Message Digest 5 (MD5), Secure Hash Algorithm (SHA), and Hash-based Message Authentication Code (HMAC)
MAC (NIC)
Media Access Control
MAC (Mandatory)
Mandatory Access Control
MAC (Message)
Message authentication code
Digital Signature
Provides authentication and non-repudiation
Non-repudiation
Verifies the user. Non-deniable.
Availability
Indicates that data and services are available when needed.