Authentication
What AAA component verifies user identity?
Authorization rules / permissions
What determines what a user is allowed to access?
Accounting
Which AAA component keeps logs of user activity?
Confidentiality
What does the āCā in CIA stand for?
Confidentiality
MFA mainly protects which CIA pillar?
Password + OTP, Password + fingerprint, Smart card + PIN
Name one example of multi-factor authentication
Role-Based Access Control (RBAC)
What authorization method assigns access based on job role?
They help track actions, detect misuse, and investigate incidents.
Why are logs important for security investigations?
Integrity
Which CIA pillar ensures data is not altered?
Availability
A system crash affects which CIA pillar most?
Because they can be guessed, stolen, reused, or phished.
Why are passwords alone considered weak authentication?
Users may get too much access or unauthorized access to resources.
What happens if authorization is misconfigured?
Integrity
Which CIA pillar is most affected if accounting is missing?
Denial of Service (DoS), DDoS attack, System crash, Server outage
Give one example of an availability attack.
AAA: Accounting, CIA: Integrity
Logs show unauthorized changes, which AAA and CIA elements are involved?