Triad
AAA
Deception
Non-Repudiation
100

The CIA acronym

What is Confidentiality, Integrity, and Availability

100

This component of the AAA framework verifies the identity of a user or device before granting access.

What is authentication?

100

This decoy system is set up to mimic a real system and attract attackers, diverting them from legitimate systems.  

What is a honeypot?

100

This concept ensures that a party cannot deny the authenticity of their signature or the sending of a message.

What is non-repudiation?

200

This principle of the CIA Triad ensures that information is protected from unauthorized access.

What is confidentiality?

200

This component of the AAA framework ensures that once a user is authenticated, they are only allowed to access the resources they are permitted to.

What is authorization?

200

A honeynet, which is a network of honeypots, is primarily used for this purpose in cybersecurity.

What is to detect and study cyberattacks?

200

This cryptographic method is commonly used to guarantee non-repudiation in digital communication.

What are digital signatures?

300

This principle of the CIA Triad guarantees that authorized users have reliable and timely access to data.

What is availability?

300

This component of the AAA framework keeps a record of user activities, including what resources were accessed and for how long.

What is accounting?

300

small pieces of false data or credentials, that are placed in a network to alert administrators of unauthorized access.

What are honey token's?

300

This component, often paired with encryption, ensures the origin of a message can be verified, supporting non-repudiation.

What is public-key infrastructure (PKI)?

400

This principle of the CIA Triad involves protecting data from unauthorized modifications.

What is integrity?

400

A password, biometric scan, or security token is typically used for this AAA component.

What is authentication?

400

A fake database filled with enticing but false data that alerts administrators when accessed is an example of this type of deception tool.

What is a honey database?

500

This principle can be compromised during a Distributed Denial-of-Service (DDoS) attack, affecting the availability of systems and networks.

What is availability?

500

This AAA component controls what actions a user can perform on a system, such as read, write, or execute permissions.

What is authorization?

500

The name of our Dean

Who is Kevan Shafizadeh?

M
e
n
u