Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
What are the core security goals? |
Confidentiality, availability, and integrity |
|
Why is confidentiality a core security goal? |
It prevents the unauthorized disclosure of data. In other words, authorized personnel can access the data, but unauthorized personnel cannot access the data. |
|
What is encryption? |
Encryption scrambles data to make it unreadable by unauthorized personnel. Authorized personnel can decrypt the data to access it, but encryption techniques make it extremely difficult for unauthorized personnel to access encrypted data. |
|
What are access controls? |
Identification, authentication, and authorization combined provide access controls and help ensure that only authorized personnel can access data. |
|
What is Identification? |
Users claim an identity with a unique username. |
|
What is Authentication? |
Users prove their identity with authentication, such as with a password. |
|
What is Authorization? |
You can grant or restrict access to resources using an authorization method, such as permissions. |
|
What is steganography? |
The practice of hiding data within data. Many people refer to it as hiding data in plain sight. For example, you can embed a hidden message in an image by modifying certain bits within the file. If other people look at the file, they won't notice anything. |
|
T/F The best way to protect confidentiality of data is by encrypting it. |
True
|
|
What is integrity? |
Integrity provides assurances that data has not changed. This includes ensuring that no one has modified, tampered with, or corrupted the data. |