CIA Triad, A model in cybersecurity that stands for Confidentiality, Integrity, and Availability, Confidentiality, Protecting data from unauthorized access to maintain privacy., Encryption, A technique to convert data into a coded format to protect its confidentiality., Data Integrity, Ensuring data remains accurate and unchanged during its lifecycle., Availability, Ensuring data and systems are accessible to authorized users when needed., Denial of Service (DoS) Attack, An attack that prevents legitimate users from accessing a system, impacting availability., Access Control, Security measures that determine who can view or use resources in a computing environment., Digital Signature, A cryptographic tool used to verify the authenticity and integrity of data., Backup and Redundancy, Strategies to ensure data remains accessible and recoverable, enhancing availability., Data Tampering, An unauthorized alteration of data, threatening its integrity., User Authentication, The process of verifying a user’s identity to ensure only authorized access., Confidentiality vs. Availability Conflict, A scenario where protecting information could limit its availability to users..

Leaderboard

Visual style

Options

Switch template

)
Continue editing: ?