Skip to content
This repository has been archived by the owner on Aug 28, 2019. It is now read-only.

Added content #4091

Merged
merged 2 commits into from
Jul 21, 2018
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -40,3 +40,10 @@ Measures to mitigate threats to availability include:
- Failover
- RAID
- High-availability clusters

Other than the CIA triad, there are also other frequently recurring themes in information security:
- non-repudiation: assurance that someone/ something cannot deny something (e.g. one cannot deny the authenticity of a digital signature)
- authentication: proving that a person is who they claim to be
- reliability: confidence that one can depend on a system or process
- privacy: a generalised counterpart of confidentiality which also address the social consequence of failing to meet the requirement