Prof Messer CompTIA SY0-701 Security+ 1.2 Exam with
|| || || || || || || ||
accurate answers ||
The CIA Triad - ✔✔Confidentiality, Integrity, Availability
|| || || || || ||
Confidentiality - ✔✔prevent disclosure of info to unauthorized people/systems
|| || || || || || || ||
some ways to provide it:
|| || || ||
encryption
access controls ||
2 factor auth
|| ||
Integrity - ✔✔messages cant be modified without detection
|| || || || || || ||
some ways to provide it:
|| || || ||
hashing
digital signatures
||
certificates ||
non-repudiation
certificates - ✔✔combined with dig sigs to verify an individual
|| || || || || || || || ||
Availability - ✔✔systems and networks must be up and running
|| || || || || || || || ||
some ways to provide it:
|| || || ||
redundancy
, 2
fault tolerance ||
patching
fault tolerance - ✔✔the ability for a system to keep running even when a failure occurs
|| || || || || || || || || || || || || || ||
non-repudiation - ✔✔provides proof of integrity, can be asserted to be genuine || || || || || || || || || || ||
you cant deny what you said - no take backs
|| || || || || || || || ||
proof of integrity - ✔✔verify data doesnt change - remains accurate and consistent
|| || || || || || || || || || || ||
in cryptography - hash is used
|| || || || ||
- only tells if data was changed, not linked to an individual
|| || || || || || || || || || ||
proof of origin - ✔✔prove source of the message
|| || || || || || || ||
make sure signature is not fake|| || || || ||
sign with the private key
|| || || ||
- message doesnt need to be encrypted
|| || || || || ||
- nobody else has the private key (only person sending the data)
|| || || || || || || || || || ||
verify with the public key associated with the private key
|| || || || || || || || ||
- any change to the message will invalidate the signature
|| || || || || || || || ||
creating a digital signature - ✔✔ || || || || ||