CIA Triad

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

User Access Control (UAC)

Controlling which users have access to networks and what level of access each user has

Threat

An attacker or piece of malware that desires and/or is able to cause harm to a target

Data Integrity

Assurance that information has not been tampered with or corrupted between the source and the end user

Source Integrity

Assurance that the sender of the information is who it is supposed to be

CIA Triad

Confidentiality, Integrity and Availability

File permissions

Customizable settings that only allow certain users to view and edit files

Integrity

Data Integrity and Source Integrity

Confidentiality Methods/Tools

Encryption and User access control

Integrity Methods/Tools

Encryption ‐ User access control ‐ File permissions ‐ Version control systems/backups

Availability

Ensuring data is accessible by approved users when needed

Vulnerability

Flaw in an environment that an attacker can use to harm the target

Hot Site

Has all the equipment needed for the enterprise to continue operation, including office space and furniture, telephone jacks and computer equipment.

Warm Site

Is a compromise between hot and cold. These sites will have hardware and connectivity already established, though on a smaller scale than the original production site or even a hot site. These sites might have backups on hand, but they may not be complete and may be between several days and a week old. The recovery will be delayed while backup tapes are delivered to the site, or network connectivity is established and data is recovered from a remote backup site

Cold Site

Is a similar type of disaster recovery service that provides office space, but the customer provides and installs all the equipment needed to continue operations, and is less expensive, but it takes longer to get an enterprise in full operation after the disaster.

Confidentiality

Making sure only approved users have access to data

Availability Methods/Tools

Offsite data storage/backups ‐ Redundant architecture (hardware and software)

Encryption

Passwords, encryption keys

PPT

People, Processes and Technology is a holistic approach to securing an organization's information

Exploit

The method by which an attacker can use a vulnerability

Risk

The potential that a threat will exploit a vulnerability


संबंधित स्टडी सेट्स

Microeconomics Chapter 8 Study Guide

View Set

Questions for The Help (a.k.a. Niceville)

View Set

Postoperative Exercises: Diaphragmatic Breathing and Controlled Coughing

View Set

Chapter 4: Legal and Ethical Aspects of Nursing

View Set

Advanced Psychological Statistics Final

View Set