Summary
In this chapter, we learned about the fundamentals of information security—that is, confidentiality (make the information known only to intended parties), availability (keep the information available at all times for unauthorized users), and integrity (prevent unauthorized users from modifying the information), also known as the CIA triad. We then learned about the principles of access management, known in their abbreviated form as IAAA. These principles are identification (all users should be identifiable), authentication (all users should authenticate using single-factor authentication (SFA) or, preferably, MFA), authorization (users should only be able to perform operations that they are authorized to do), and accountability (all user activity should be logged and monitored).
In the next few sections, we learned about encryption and the types of encryption—symmetric (uses a single key for encryption and decryption) and asymmetric (uses a public/private key...