CIA_Triad_Flashcards
(20 cards)
CIA Triad
A cybersecurity framework consisting of Confidentiality, Integrity, and Availability.
Confidentiality
Ensures only authorized users can access or modify data.
Integrity
Maintains accuracy and consistency of data over its lifecycle.
Availability
Ensures data is accessible to authorized users when needed.
Authentication
Verifies a user’s identity using methods like passwords or biometrics.
Authorization
Determines what resources a user is allowed to access.
Encryption
Converts data into a secure format to maintain confidentiality.
Checksum
A hash used to verify data integrity.
Digital Signature
Cryptographic method for verifying the authenticity and integrity of data.
RAID
Redundant Array of Independent Disks used for data redundancy and availability.
Failover
A backup operational mode that switches to a standby system if the primary fails.
Denial-of-Service (DoS)
An attack that makes systems unavailable to users.
Parkerian Hexad
An extension of the CIA Triad adding Authenticity, Possession, and Utility.
Non-repudiation
Prevents denial of actions, such as sending or modifying data.
Public-Key Cryptography
Uses a pair of keys to encrypt and decrypt messages for secure communication.
Version Control
Tracks changes to files to preserve data integrity.
Backup
A copy of data stored separately to restore integrity and availability.
Air-gapped System
A computer or network that is isolated from unsecured networks.
2-Factor Authentication (2FA)
Security process requiring two methods of verification to access resources.
Disaster Recovery Plan
A documented process to recover data and systems after a disruption.