Confidentiality, integrity, and availability together are often referred to as the security triad.
Confidentiality is used to prevent the unauthorized disclosure of data and is enforced with encryption. If there is a risk of sensitive data falling into the wrong hands, it should be encrypted to make it unreadable.
Message authentication code (MAC) used for integrity similar to how a hash is used
minimum, you should know the ports listed in table 3.1.
Note: flash cards for all