How Can We Help?
< Back
You are here:
Print

SY0-401-C1-Mastering Security Basics Notes

  • Confidentiality – Prevents unauthorized disclosure of data. Steganography provides this by hiding data within data.
  • Encryption – scramble data to make it unreadable
  • Access Controls – Identification, Authentication, Authorization combined provide access controls help ensure only authorized personnel can access the data.
    1. Identification – Users claim identity with unique user name
    2. Authentication – Users prove their identity with authentication.
    3. Authorization – Grant or restrict access to resources based on user permissions.

Security Triad – Confidentiality, Integrity, Availability

Remember this – Confidentiality ensures that data is only viewable by authorized users. The best way to do this is by encrypting. PII, DB data , mobile data. Access controls help protect confidentiality by restricting access. Steganography example: Hiding text files within image files.

 

 

Section Practice Test

1. What time do you go home

 
 
 
 

Question 1 of 1

Table of Contents