real CIA triad Flashcards
(7 cards)
what is it
combination of principles
the fundamentals of security
sometimes referenced as the AIC triad
what is the C
confidentiality
prevent disclosure of info to unauthorized individuals or systems
what is the I
integrity
messages can’t be modified without detection
what is the A
availability
systems and networks must be up and running
confidentiality
certain info should only be known by certain ppl
encryption
- encode messages so only certain ppl can read it
access controls
- selectively restrict access to a resource
two factor authentication
- additional confirmation before info. is disclosed
integrity
data is stored and trasnferred as intended
- any modification to the data would be identified
hashing
- map data of an arbitrary length to data of a fixed length
digital signatures
- math scheme to verify the integrity of data
certifications
- combine with a digital signature to verify an individual
non repudiation
- provide proof of integrity can be asserted to be genuine
availability
info is accessible to authorized users
- always at your fingertips
redundancy
- build services that will always be available
fault tolerance
- system will continue to run even when failure occurs
patching
- stability
- close security holes