1.1 Understanding the CIA Triad Flashcards

1
Q

What is the CIA Triad? Why is it important?

A

This the confidentiality, integrity, and availability triad. It is the fundamental security issue. All policy revolves around addressing the triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

C - in the CIA Triad. What’s it do? What is it for? What is the biggest threat if C is comprimised?

A

Confidentiality, keeping resources and secrets safe. No one but the intended receiver should have access to the resources being sent.

Encryption is an example of something address confidentiality.

Unauthorized access to resources. Unintended disclosure. HIPPA is another good example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the relationship between subjects and objects as it pertains to security? What is the relationship known as?

A

The relationship is access control. The object is the passive resource, a file for example. The subject is the person trying to interact with object, i.e. access the file.

Computers, programs, or people can be subjects.

Balancing this relationship is controlling access to objects through limiting the powers of a the subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attacks affect C?

A

The ones that focus on decrpyting data or obtaining credentials to access restricted content. Network sniffing, social engineering, port scanning, escalation of privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of negligence affect C?

A

Leaving open security access points, giving passwords out to unauthorized personnel, failing to authenticate a system before transferring data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is object I and how does it relate to C?

A

Object integrity is the inability of an object to be modified without permission. If you can edit anything, whether or not the information is confidential is irrelevant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is sensitivity as it relates to C?

A

It is the quality of the data. So social security numbers is far more sensitive data than publicly available info like an address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is discretion?

A

A chance for an operator to intervene in the disclosure of information. Giving permission might be an example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Concealment

A

Security through obscurity. Maybe something like hiding in plain sight. Not particularly useful. A real example would be not publishing where your data center is anywhere, making it difficult to locate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is integrity? What does it prevent? Why is it important?

A

Limiting the ability to modify data to only authorized personnel. This prevents viruses and other malicious software from making changes to data. It also prevents mistakes from employees.

Maintaining consistency of data is everything. Data has to be accurate and verifiable. It has to be crosschecked with other data to ensure validity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Parts of integrity - Accuracy

A

Being correct and precise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Truthfulness

A

Being accurate to the real world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authenticity

A

Being authentic or genuine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Validity

A

Being factual or logically sound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nonrepuditation

A

Being unable to deny a change was made. Important in tracking mistakes and abused vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Accountability

A

Being responsible for the result

17
Q

Responsibility

A

Being in charge of something

18
Q

Completeness

A

Having all needed and necessary components or parts

19
Q

Comprehensiveness

A

Being complete in scope

20
Q

What is the A in CIA Triad? Why is it important?

A

Authorized subjects are granted timely and unlimited access to objects. Making sure devices are not so secure that they are unavailable to the users who need them.