Confidentiality ensures that information is accessible only to authorized users by applying encryption, authentication, and controlled access. This principle prevents sensitive data from being read or copied during transit or storage.
Integrity focuses on maintaining the accuracy and trustworthiness of data by preventing unauthorized modification. Techniques like hashing or controlled write permissions ensure that data alterations are traceable and deliberate.
Availability ensures that systems, services, and data are accessible when needed, despite potential threats or failures. Strategies such as backups and redundant systems protect against downtime due to attacks or hardware malfunctions.
Least privilege restricts users and applications to only the permissions necessary for their tasks. This minimizes potential damage from compromised accounts by limiting their access to sensitive resources.
Defense in depth layers multiple security controls to ensure that if one mechanism fails, others continue to protect the system. Combining authentication, encryption, and monitoring creates a robust, multi-tiered security posture.
Secure communication relies on cryptographic keys and protocols to ensure that transmitted data remains confidential and authentic. By converting readable data into encoded formats, the system prevents interception from resulting in meaningful exposure.
Traffic filtering applies predetermined rules to manage which packets are allowed through the network. This principle ensures that only legitimate communication is permitted, reducing the risk of malware or intrusions.
Username and password authentication validates user identity by requiring a shared secret known only to the individual. Its effectiveness depends on complexity, length, and regular updates to reduce the risk of unauthorized guessing or brute-force attacks.
Firewall filtering inspects data packets and applies rule-based decisions to allow or block traffic. Hardware firewalls protect entire networks, while software firewalls provide device-specific filtering, creating a dual-layered protection model.
Symmetric encryption uses a single shared key for both encoding and decoding data. It is computationally efficient and well-suited for large data volumes, but requires secure key distribution to prevent unauthorized decoding.
Public key encryption uses mathematically linked key pairs, where the public key encrypts data and only the corresponding private key can decrypt it. This allows secure communication without requiring secret pre-shared keys between sender and receiver.
Wireless protections (WEP/WPA) apply encryption to data transmitted over wireless connections. WPA enhances security by assigning unique keys to each device and frequently changing encryption keys to reduce interception risks.
Virtual private networks (VPNs) create encrypted communication tunnels over public networks, allowing remote users to access private resources securely. This method ensures confidentiality even when connecting through untrusted internet connections.
File access rights define read, write, execute, and delete permissions at the file or folder level. By granting only the required permissions, organizations reduce the risk of accidental damage or intentional misuse of sensitive data.
| Feature | Symmetric Encryption | Public Key Encryption |
|---|---|---|
| Key usage | Same key for encryption and decryption | Public key encrypts, private key decrypts |
| Speed | Faster for large data blocks | Slower due to complex algorithms |
| Key distribution | Needs secure exchange | No shared secret required |
| Feature | WEP | WPA |
|---|---|---|
| Key model | One shared key | Unique keys per device |
| Security | Weak, vulnerable to interception | Stronger and more dynamic |
Hardware vs software firewalls differ because hardware protects entire networks at entry points, while software firewalls monitor activity on individual devices. The distinction helps organizations choose the correct layer of defense for their environment.
Authentication vs authorization separates validating identity from determining permitted actions. This differentiation ensures that even verified users cannot exceed their assigned privileges.
Always specify why a method improves security, noting whether it protects confidentiality, integrity, or availability. This clarifies the underlying mechanism rather than describing the tool superficially.
Use precise terminology such as "encrypts data using keys" or "filters incoming packets based on rules" to demonstrate understanding of how each method functions. Vague statements often lose marks due to lack of technical accuracy.
Explain weaknesses or trade-offs (e.g., symmetric encryption requiring secure key exchange) to show deeper conceptual insight. Examiners reward explanations that demonstrate awareness of real-world implications.
Distinguish clearly between authentication and encryption, since they serve different purposes in network protection. Confusing these concepts often leads to incomplete or incorrect responses.
Reference the purpose of access rights when discussing permissions by explaining how they prevent unauthorized modifications. This demonstrates clear understanding of authorization concepts.
Discuss both hardware and software elements where relevant, especially in firewall questions. Including both strengthens answers and highlights awareness of layered security.
Mention encryption’s role in protecting data during transmission when describing VPNs. This directly addresses the mechanism that secures remote communication.
Believing that passwords alone provide complete security leads to underestimating the need for additional controls such as encryption or firewalls. Passwords only authenticate users and do not protect transmitted data from interception.
Assuming all wireless encryption methods are equally secure ignores the vulnerabilities of older protocols like WEP. Using outdated standards exposes networks to attacks even if passwords are strong.
Confusing public and private keys can result in misunderstanding how data is securely transmitted. Public keys are widely shared for encryption, whereas private keys must remain confidential for secure decryption.
Relying solely on firewalls to stop all threats creates a false sense of security. Firewalls filter traffic but cannot prevent internal misuse or data leaks from authenticated users.
Misinterpreting access rights as optional features leads to improper resource protection. Permissions are essential for preventing unauthorized reading or editing of sensitive files.
Overlooking the importance of monitoring and logs results in delayed detection of breaches. Logs provide critical insights into suspicious behavior that may indicate ongoing attacks.