CISSP – the CIA Triad – Integrity!
We want system and Data integrity We use: Cryptography (again). Check sums (This could be CRC). Message Digests also known as a hash (This could be MD5, SHA1 or SHA2).…
We want system and Data integrity We use: Cryptography (again). Check sums (This could be CRC). Message Digests also known as a hash (This could be MD5, SHA1 or SHA2).…
We want to keep our information confidential. We use: Encryption for data at rest (for instance AES256), full disk encryption. Secure transport protocols for data in motion. (SSL, TLS or…
The CIA Triad (AIC) Confidentiality This is what most people think IT Security is. We keep our data secure and our secrets secret. We ensure no one unauthorized can access…
Upcoming in-person classes at Honolulu Community College 8/22-9/21: CISSP Domains 1-3 (A): Security and Risk Management CISSP Domains 1-3 (B): Asset Security and Security Engineering CISSP Domains 1-3 (C): CISSP…