• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

What are the core security goals?

Confidentiality, availability, and integrity

Why is confidentiality a core security goal?

It prevents the unauthorized disclosure of data. In other words, authorized personnel can access the data, but unauthorized personnel cannot access the data.

What is encryption?

Encryption scrambles data to make it unreadable by unauthorized personnel. Authorized personnel can decrypt the data to access it, but encryption techniques make it extremely difficult for unauthorized personnel to access encrypted data.

What are access controls?

Identification, authentication, and authorization combined provide access controls and help ensure that only authorized personnel can access data.

What is Identification?

Users claim an identity with a unique username.

What is Authentication?

Users prove their identity with authentication, such as with a password.

What is Authorization?

You can grant or restrict access to resources using an authorization method, such as permissions.

What is steganography?

The practice of hiding data within data. Many people refer to it as hiding data in plain sight. For example, you can embed a hidden message in an image by modifying certain bits within the file. If other people look at the file, they won't notice anything.

T/F The best way to protect confidentiality of data is by encrypting it.

True


What is integrity?

Integrity provides assurances that data has not changed. This includes ensuring that no one has modified, tampered with, or corrupted the data.