CIA Triad - A model in cybersecurity that stands for Confidentiality, Integrity, and Availability, Confidentiality - Protecting data from unauthorized access to maintain privacy., Encryption - A technique to convert data into a coded format to protect its confidentiality., Data Integrity - Ensuring data remains accurate and unchanged during its lifecycle., Availability - Ensuring data and systems are accessible to authorized users when needed., Denial of Service (DoS) Attack - An attack that prevents legitimate users from accessing a system, impacting availability., Access Control - Security measures that determine who can view or use resources in a computing environment., Digital Signature - A cryptographic tool used to verify the authenticity and integrity of data., Backup and Redundancy - Strategies to ensure data remains accessible and recoverable, enhancing availability., Data Tampering - An unauthorized alteration of data, threatening its integrity., User Authentication - The process of verifying a user’s identity to ensure only authorized access., Confidentiality vs. Availability Conflict - A scenario where protecting information could limit its availability to users.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?