CIA Triad, A model in cybersecurity that stands for Confidentiality, Integrity, and Availability, Confidentiality, Protecting data from unauthorized access to maintain privacy., Encryption, A technique to convert data into a coded format to protect its confidentiality., Data Integrity, Ensuring data remains accurate and unchanged during its lifecycle., Availability, Ensuring data and systems are accessible to authorized users when needed., Denial of Service (DoS) Attack, An attack that prevents legitimate users from accessing a system, impacting availability., Access Control, Security measures that determine who can view or use resources in a computing environment., Digital Signature, A cryptographic tool used to verify the authenticity and integrity of data., Backup and Redundancy, Strategies to ensure data remains accessible and recoverable, enhancing availability., Data Tampering, An unauthorized alteration of data, threatening its integrity., User Authentication, The process of verifying a user’s identity to ensure only authorized access., Confidentiality vs. Availability Conflict, A scenario where protecting information could limit its availability to users..
0%
CIA Triad Match
Share
Share
Share
by
Thruss09
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
)
Open results
Copy link
QR code
Delete
Continue editing:
?