0 likes | 5 Views
CIATriad forms the foundation for effective security measures. Safeguarding the confidentiality, integrity, and availability of information is essential for organizations to minimize risks and protect critical assets. By adopting and enforcing these principles, organizations can strengthen their security framework and foster trust with stakeholders.<br><br>For ore info - https://www.linkedin.com/posts/infosec-train_cia-traid-activity-7264897064461901824-CFBv?utm_source=share&utm_medium=member_desktop<br>
E N D
1. Symmetric Encryption 2. Asymmetric Encryption Encryption Methods 1. User Authentication 2. Role Based Access Control 3. Mandatory Access Control Access Controls Confidentiality 1. Password Policies 2. Data Handling policies 3. Incident Response Policies Security Policies Swipe
SHA-2 SHA-3 MD5 Hash functions Digital Signatures RSA DSA Integrity Error Detection Codes Parity check Checksum Swipe
1. Full backup 2. Incremental Backup 3. Differential Backup Backup Strategies 1. Hardware Redundancy 2. Software Redundancy 3. Data Redundancy Redundancy Availability 1. Active - Active Failover 2. Active -Passive Failoer Failover Load Balancing Least Connection'method IP Hash Swipe
FOUND THIS USEFUL? To Get More Insights Through Our FREE Courses | Workshops | eBooks | Checklists | Mock Tests LIKE SHARE FOLLOW