week 2
8.4 Interrelationship of components required for effective security
8.4.1 Understand how the relationships in the CIA triad interrelate:
• confidentiality:
o ensuring that data is kept private by controlling who has access to
the data
• integrity:
o ensuring that the data has not been tampered with; this can be done
by maintaining confidentiality
• availability:
o ensuring that data is available and useful; this can be done by
ensuring integrity.
8.4.2 Understand the elements of the Identification Authentication Authorisation
Accountability (IAAA) model, including the techniques used and their
benefits and drawbacks:
• identification:
o recognising the individual within a digital system
o knowledge-based identification, including username
o possession-based identification methods
o biometric-based ID methods
• authentication:
o verifying the identity claimed during the identification phase
o multi-factor authentication methods
o passwords and pass phrases
o biometric authentication
• authorisation:
o ensuring that authenticated users can only access resources and
perform actions that they are permitted to
o role-based using the role of the user within the digital system
o access control lists
• accountability:
o ensuring that any actions within a system can be traced back to the
responsible user
o audit logs
o user activity monitoring.
Last Updated
2025-07-07 16:00:51
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Files that support this week
Week 2←
PrevWeek 2←
PrevWeek 3←
Prev→
Next