EXAMS 2026 VIEW AHEAD EXAM
● Parkerian Hexad - Confidentiality, Integrity, Availability, Possession,
Authenticity, Utility
● Attack Types - Interception, Interruption, Modification, Fabrication
● Threat - Potential to cause harm
● Vulnerability - Weaknesses that can be exploited
● Authentication - Verifying a person's identity
● Mutual Authentication - Both parties authenticate each other
● Risk Management Process - Identify Asset, Identify Threats, Assess
Vulnerabilities, Assess Risk, Mitigate Risk
● Incident Response Process - Preparation, Detection and Analysis,
Containment, Eradication, Recovery, Post-incident activity
, ● Authorization - Determining user access privileges
● Least Privilege - Giving minimum access necessary
● Access Control - Allowing, Denying, Limiting, Revoking access
● Access Control Models - Discretionary, Mandatory, Rule-based, Role-
based, Attribute-based
● Accountability - Ensuring responsibility for actions
● Nonrepudiation - Preventing denial of actions
● Intrusion Detection (IDS) - Monitoring and reporting malicious events
● Intrusion Prevention (IPS) - Taking actions when malicious events
occur
● Auditing - Examination of organization's records for accountability
● Cryptography - Practice of keeping information secure through codes
and ciphers