| Principle | What it means | Typical protective measures (exam‑relevant) |
|---|---|---|
| Confidentiality | Only authorised users may read the data. | Encryption, strong passwords, access‑control lists, firewalls. |
| Integrity | Data must be accurate, complete and un‑altered. | Hash functions, checksums, digital signatures, validation routines. |
| Availability | Data and services must be accessible when required. | Back‑ups, redundant servers, DDoS mitigation, reliable power. |
| Authentication | Verification of the identity of a user, device or process. | Passwords, two‑factor authentication (2FA), biometrics. |
| Privacy | Protection of personal or sensitive information from unauthorised collection or disclosure, and handling it in accordance with legal/ethical requirements. | Data‑classification, anonymisation, GDPR‑style policies. |
| Threat | Typical effect | Key counter‑measure(s) |
|---|---|---|
| Malware (viruses, ransomware, spyware) | Unauthorised modification, loss or encryption of data. | Anti‑virus/anti‑malware software, regular patching. |
| Phishing & social engineering | Credentials or personal data are disclosed to attackers. | User education, email filtering, 2FA. |
| Man‑in‑the‑Middle (MitM) | Data intercepted or altered in transit. | TLS/SSL, SSH, VPNs, certificate validation. |
| Denial‑of‑Service (DoS/DDoS) | Legitimate users cannot access a service. | Firewalls, rate‑limiting, redundant servers. |
| Insider threat | Authorized users misuse access. | Least‑privilege, role‑based access control, audit logs. |
| Unauthorised access (hacking, password cracking) | Attacker gains illegal entry to a system. | Strong passwords, account lock‑out, IDS/IPS. |
| School‑specific example | Phishing email to teachers requesting login details. | Awareness training, 2FA for staff accounts. |
salt = generateRandomBytes(16)
hash = SHA‑256(salt || password) // “||” = concatenation
store = salt || hash // both saved for later verification
| Measure | Confidentiality | Integrity | Availability |
|---|---|---|---|
| Strong passwords & 2FA | ✓ | – | – |
| Anti‑virus & host firewall | ✓ | ✓ (prevents tampering) | ✓ (keeps system running) |
| Symmetric encryption (AES) | ✓ | ✓ (when used with a MAC) | – |
| Asymmetric encryption (RSA/ECC) | ✓ | ✓ (digital signatures) | – |
| Hash functions / checksums | – | ✓ | – |
| Back‑ups (encrypted) | ✓ | ✓ | ✓ |
| RBAC / DAC / MAC | ✓ | ✓ | ✓ (prevents accidental lock‑out) |
Illustrate the life‑cycle of a secure message:
This flow shows how confidentiality, integrity, authentication and (via the signature) non‑repudiation are achieved.
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.