1.2_ Surveying Cyberspace Flashcards
What is the CIA TRIAD?
These three letters stand for confidentiality, integrity, and availability.
The quality of being able to be used or obtained belongs to what part of the triad?
Availability
What are some examples of availability attacks?
Hackers taking down a web-connected generator and disabling a critical power supply; using a denial of service attack to bring down a financial service provider’s website, making it impossible for clients to make transactions.
Creating regular backups of data is what part of the triad?
Availability
The quality of being honest, whole, or undivided is what part of the triad.
Integrity
What’s one example of integrity attacks?
Examples of integrity attacks include: intercepting money transfers and changing the dollar amount in “insignificant” ways in order to siphon off the excess; altering university grades to be better or worse.
What is the state of being kept secret or private attributed to?
Confidentiality
A hospital only allows authorized healthcare personnel within one department access to patient Personal Identifiable Information. When employees move to another department, that access is revoked is what part of the triad?
Confidentiality
Only authorized personnel at a company have to write access to certain files. All other employees have only read access to these files is an example of what part of the triad?
Integrity
A company employs redundant servers, which means that these systems are duplicated, and in the event of a malfunction, one server will fail over to other.
Availability
A hacker uses a man-in-the-middle attack to intercept wireless traffic from users. What part of the triad is this?
Confidentiality
The process of identifying, containing and remediating threats on behalf of a company or organization is what cybersecurity domain?
Security operations
List all 9 cybersecurity domains
- Security architecture
- Security operations
- Governance:
- Physical security
- Threat intelligence
- Career development:
- Risk assessment
- User education
- Frameworks and standards:
Security design that addresses the requirements and potential risks involved in a given scenario or environment. It also specifies when and where to apply security controls is what domain?
Security architecture
The framework for managing performance and risk, oversight of compliance and control responsibilities, and defining the cyber mission by mapping the structure, authority, and processes to create an effective program is what domain?
Governance