The document discusses the security triad of confidentiality, integrity, and availability as they relate to threats. It covers physical and electronic protections for confidentiality and methods like hashing and checksums for ensuring integrity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
166 views52 pages
Sec501 Study Guide
The document discusses the security triad of confidentiality, integrity, and availability as they relate to threats. It covers physical and electronic protections for confidentiality and methods like hashing and checksums for ensuring integrity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52
Security+ 501 Study Guide
05/31/2019 Threat Management Security Triad (CIA)
CONFIDENTIALITY ▪ How secure is the information?
How secure does the data need to be? ● Physical Protections o Locked doors, fences, security guards, security cameras, safes ▪ Electronic Protections ● Encryption (storage and in transit), passwords, firewalls, two-factor authentication Failure of confidentiality occurs if someone can obtain and view the data
• INTEGRITY ▪ How correct is the information?
Has the data been modified during retrieval, in transit, or in storage? Best methods ● Hashing of files and information • ● Checksums during data transmission Failure of integrity occurs if someone modifies the data being stored or when it is in transit Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019 Security+ 501 Study Guide 05/31/2019