Chapter 1 Flashcards
(129 cards)
Define Confidentiality:
prevents the unauthorized disclosure of data.
The different methods to ensure confidentiality is:
Encryption
Access Controls
Steganography
Obfuscation
Define Encryption:
scrambles data to make it unreadable by unauthorized personnel
What is included to provide access controls?
Identification
Authentication
Authorization
Define Identification:
a unique username
Define Authentication:
a password
Define Authorization:
grant or restrict access to resources
Define Steganography:
the practice of hiding data within data
Define obfuscation:
security through obscurity
The CIA security triads includes:
Confidentiality
Integrity
Availability
Define Integrity:
provides assurances that data has not changed
What can you use to enforce integrity?
Hashing or Message Authentication Code (MAC)
Digital signatures
Describe hash:
a number created by executing a hashing algorithm against data, such as a file or message
What are two key concepts related to integrity?
Integrity provides assurances that data has not been modified, tampered with, or corrupted
Hashing verifies integrity
Digital signatures provide:
non-repudiation
Digital signatures requires:
the use of certificates
and
Public Key Infrastructure (PKI)
Certificates include:
keys used for encryption
Public Key Infrastructure provides:
the means to create, manage, and distribute certificates
Define non-repudiation:
the ability to prevent a party from denying an action.
Access logs provide:
non-repudiation
Define availability:
indicates that data and services are available when needed
What is a common goal of fault tolerance and redundancy?
To remove each single point of failure (SPOF)
Some fault tolerance and redundancy techniques:
Disk redundancies
Server redundancies
Load balancing
Site redundancies
Backups
Alternate power
Cooling systems
Define disk redundancies:
fault-tolerant disks allow a system to continue to operate even if a disk fails