CIA_Triad_Flashcards

(20 cards)

1
Q

CIA Triad

A

A cybersecurity framework consisting of Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Ensures only authorized users can access or modify data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Maintains accuracy and consistency of data over its lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Ensures data is accessible to authorized users when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Verifies a user’s identity using methods like passwords or biometrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

Determines what resources a user is allowed to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

Converts data into a secure format to maintain confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Checksum

A

A hash used to verify data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Signature

A

Cryptographic method for verifying the authenticity and integrity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAID

A

Redundant Array of Independent Disks used for data redundancy and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Failover

A

A backup operational mode that switches to a standby system if the primary fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial-of-Service (DoS)

A

An attack that makes systems unavailable to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Parkerian Hexad

A

An extension of the CIA Triad adding Authenticity, Possession, and Utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Non-repudiation

A

Prevents denial of actions, such as sending or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public-Key Cryptography

A

Uses a pair of keys to encrypt and decrypt messages for secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Version Control

A

Tracks changes to files to preserve data integrity.

17
Q

Backup

A

A copy of data stored separately to restore integrity and availability.

18
Q

Air-gapped System

A

A computer or network that is isolated from unsecured networks.

19
Q

2-Factor Authentication (2FA)

A

Security process requiring two methods of verification to access resources.

20
Q

Disaster Recovery Plan

A

A documented process to recover data and systems after a disruption.