401 Reading 6 - marsecguy/reading-notes-cyberops GitHub Wiki

CIA Triad

  1. You have been made responsible for the company’s file server. How would you preserve the three elements of the CIA triad?

    • Confidentiality: I would apply encryption protocols for data at rest and data in transit.
    • Integrity: Employ hash functions and digital signatures.
    • Availability: Utilize high availability (HA) cluster and/or RAID configurations.
  2. Explain how hashing verifies data integrity using non-technical terms.

    • Hashing runs the data through an algorithm that generates a unique set of characters. Any change at all to the data would generate an entirely different set of characters. Consequently, if the sata is run through the algorithm and the hash values match, you can be certain the integrity of the data is intact.
  3. How is hashing and encryption different?

    • Hashing is a one-way process. A hash value cannot be used to reconstruct the original data. It isn't a form of "translation" of the data; it merely validates its authenticity. Encryption is a "translation". It's outcome is directly related to the content of the data and can be used to reconstruct the data, if the correct key (or decoder) is applied.

Sources: JSCAPE, How-To-Geek