0% found this document useful (0 votes)
166 views52 pages

Sec501 Study Guide

The document discusses the security triad of confidentiality, integrity, and availability as they relate to threats. It covers physical and electronic protections for confidentiality and methods like hashing and checksums for ensuring integrity.

Uploaded by

deserki20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
166 views52 pages

Sec501 Study Guide

The document discusses the security triad of confidentiality, integrity, and availability as they relate to threats. It covers physical and electronic protections for confidentiality and methods like hashing and checksums for ensuring integrity.

Uploaded by

deserki20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Security+ 501 Study Guide

05/31/2019
Threat Management
Security Triad (CIA)

CONFIDENTIALITY ▪ How secure is the information?


How secure does the data need to be?
● Physical Protections o Locked doors, fences, security guards, security cameras, safes
▪ Electronic Protections ● Encryption (storage and in transit), passwords, firewalls, two-factor
authentication
Failure of confidentiality occurs if someone can obtain and view the data

• INTEGRITY ▪ How correct is the information?


Has the data been modified during retrieval, in transit, or in storage?
Best methods ● Hashing of files and information
• ● Checksums during data transmission
Failure of integrity occurs if someone modifies the data being stored or when it is in transit
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019
Security+ 501 Study Guide
05/31/2019

You might also like