Professional Documents
Culture Documents
01 DSF VE1 - Security Concepts and Models
01 DSF VE1 - Security Concepts and Models
AICT006-4-2-DSF
VE1
If you have mastered this topic, you should be able to use the following
terms correctly in your assignments and exams:
• CIA
– Confidentiality
– Integrity
– Availability
• AAA
– Authentication
– Authorization
– Accounting
• Confidentiality:
prevent/detect/deter
improper disclosure of
information.
• Integrity:
prevent/detect/deter
improper alteration of
information.
• Availability:
prevent/detect/deter
improper denial of
access to services.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Accounting: the method for collecting and sending information used for
auditing and reporting, such as user identities, start and stop times,
executed commands, number of packets, and number of bytes.
5-10 mins
• Explain CIA Triad.
• Find one CIA Triad diagram from the Internet and share it in
class.
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Untrained users
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Information Security
Threats
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Network-Based Attacks
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
https://quizizz.com/join
Access Administrator
• Single Sign-On: An aspect of Control
sites.
Access Control <=> Availability
Copyright (c) 2018 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Users and software should have the minimal level of access that
is necessary for them to perform the duties required of them.
– Applies access to facilities, computer hardware, software, and information.
– Assign only the level of access required to perform the necessary tasks.
User 1 User 4
Perform their jobs Perform their jobs
with fewer privileges with more privileges
User 2 User 3
Data Entry Clerks Financial Coordinators
• https://www.keepersecurity.com/assets/pdf/PAM-vs-SSO-vs-
PasswordManager.pdf
www.acm.org/about/code-of-ethics
• https://www.acm.org/code-of-ethics/case-studies
Common
Concepts of Security
Terms in
Security Management
Security