The pillar of the triad focused entirely on keeping secrets safe so that only authorized people can view the data.
What is Confidentiality?
A weakness or flaw present in your system or network.
What is a Vulnerability?
The process of proving your identity at the front door to answer the question, "Who are you?"
What is Authentication?
A feature that allows users to authenticate just once to access multiple different services without needing to re-enter their credentials.
What is Single Sign-On (SSO)?
Regular, rigorous checks performed by internal or external inspectors to ensure security protocols are actually being followed.
What are Audits?
The pillar of the triad that ensures systems and data are actually up and running whenever authorized users need them.
What is Availability?
A potential danger that could trigger a weakness in your system.
What is a Threat?
The process that determines your exact permissions once inside the network, answering the question, "What can you do?"
What is Authorization?
In a Public Key Infrastructure (PKI), this is the key that is mathematically linked to your public key but must be kept highly secure to unlock your data.
What is a Private Key?
The strict set of rules a company must follow if they process, store, or transmit credit card data.
What is PCI DSS (Payment Card Industry Data Security Standard)?
The pillar of the triad that prevents tampering and ensures data hasn't been maliciously altered.
What is Integrity?
The actual technical tool or method an attacker uses to take advantage of a vulnerability.
What is an Exploit?
The golden rule that mandates giving a user only the exact access required to perform their specific duties, and absolutely nothing more.
What is the Principle of Least Privilege?
Acting as the digital phonebook, this protocol is used for centralizing network and corporate directories.
What is LDAP (Lightweight Directory Access Protocol)?
Comprehensive privacy laws designed to protect the personal data of European Union citizens.
What is GDPR (General Data Protection Regulation)?
A hacker using ransomware to lock a hospital out of its own patient database is primarily an attack on this specific pillar of the triad.
What is Availability?
The overall likelihood and potential impact of a successful attack against your organization.
What is Risk?
Requiring a user to log in using something they know (a password) plus something they are (a fingerprint) is an example of this.
What is Multifactor Authentication (MFA)?
This heavy-lifting markup language engine is what actually makes web-based Single Sign-On (SSO) possible.
What is SAML (Security Assertion Markup Language)?
Legal rules based on geographic borders that dictate exactly where in the physical world a server storing specific data must be kept.
What is Data Locality?
A hacker successfully intercepting an unencrypted email and reading the secret contents is a failure of this pillar.
What is Confidentiality?
According to the lesson, Risk is the sum of these three elements combined.
What are Vulnerability + Threat + Exploit?
An authorization method that groups system privileges together by job title, like a "Teacher Profile" versus a "Student Profile."
What is Role-Based Access Control (RBAC)?
Developed at MIT, this backend protocol uses the DES cryptographic algorithm and is very popular on Cisco routers.
What is Kerberos?
When dealing with Data Locality, these real-world boundaries are the primary factor in dictating exactly where a physical server must be kept.
What are geographic borders?