You are on page 1of 7

6 CORE CISSP

CONCEPTS OF
INFORMATION
ASSURANCE
STUDY NOTES AND THEORY.COM LUKE AHMED
CISSP INSTRUCTOR
01
CONFIDENTIALITY

Keep secrets a secret.


Implement security
controls that prevent
access by unauthorized
individuals or processes.

STUDY NOTES AND THEORY.COM LUKE AHMED


CISSP INSTRUCTOR
INTEGRITY 02

Data should remain


unchanged on a server or
computer. Any change is
done so with proper
authorization.

STUDY NOTES AND THEORY.COM LUKE AHMED


CISSP INSTRUCTOR
03
AVAILABILITY

Keep the lights blinking


and systems running when
they are expected to be.

STUDY NOTES AND THEORY.COM LUKE AHMED


CISSP INSTRUCTOR
AUTHENTICATION 04

Beyond just a username and


password, always use
multi-factor authentication
for system access.

STUDY NOTES AND THEORY.COM LUKE AHMED


CISSP INSTRUCTOR
NON-REPUDIATION 05

Accountability and
tracking controls that do
not allow a user to deny
sending a message or
performing an operation.

STUDY NOTES AND THEORY.COM LUKE AHMED


CISSP INSTRUCTOR
06
PRIVACY

Use both corporate


governance and security
controls to shield
personally identifiable
information from exposure.

STUDY NOTES AND THEORY.COM LUKE AHMED


CISSP INSTRUCTOR

You might also like