GCGA Ch. 1 Understanding Core Security Goals (ST) Flashcards

(8 cards)

1
Q

Confidentiality

A

ensures that data is only viewable by authorized users. Encryption is the best choice to provide confidentiality. Access controls also protect the confidentiality of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

provides assurances that data has not been modified, tampered with, or corrupted through unauthorized or unintended changes. Data can be a message, a file, or data within a database. Hashing is a common method of ensuring integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

ensures that data and services are available when needed. A common goal is to remove single points of failure. Fault tolerance methods and redundancies are commonly added to support high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scale up vs scale out

A

Systems scale up by adding additional hardware resources such as memory, processing power, bandwidth capability, and/or drive space. Systems scale out by adding additional nodes or servers. They can scale down or scale in by removing these resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scalability

A

the ability of a system to handle increased workload either by scaling up or by scaling out. This is done manually by administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Elasticity

A

the ability of a system to handle the increased workload by dynamically adding or removing resources as the need arises. Cloud resources typically have elasticity capabilities allowing them to adapt to this increased and decreased demand automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Resiliency methods

A

help systems heal themselves or recover from faults with minimal downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Balancing resource availability with security constraints

A

Organizations balance resource availability with security constraints. Security professionals may want to apply security controls everywhere without considering the cost. However, executives have a responsibility to minimize costs without sacrificing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly