CH1 Mastering Security Basics Flashcards
True or False:
Confidentiality, integrity, and availability form the CIA security triad, which is a model used to guide an organization’s security principles.
True
Page 2822
What is the security triad described as?
A model used to guide an organization’s security principles.
What is the name of the model used to guide an organization’s security principle’s ?
Security/CIA triad
What factors make up the security triad?
Confidentiality
Integrity
Availability
What does CIA stand for?
Confidentiality
Integrity
Availability
Confidentiality, Integrity, and Availability are factors for what model?
Security/CIA triad
What describes a goal that an organization wants to achieve?
Use case
A use case describes what?
A goal that an organization wants to achieve
What is a common naming convention for a use case?
Verb-noun
Give an example(s) of a well named use case
Place order
Login to system
What common elements make up a use case?
- Actors
- Precondition
- Trigger
- Post condition
- Normal flow
- Alternate flow
Match the elements below with their definitions
- Alternate flow
- Post condition
- Precondition
- Trigger
- Actors
- Normal flow
A. Starts the use case
B. Occurs after the process is triggered
C. General steps a process follows
D. Exception steps a process could follow
E. An entity which performs an action
F. Required to be done before so the process can begin
1, D 2, B 3, F 4, A 5, E 6, C
List a few elements of a use case
- Actors
- Precondition
- Trigger
- Post condition
- Normal flow
- Alternate flow
What does confidentiality do?
Prevents the unauthorized disclosure of data
What is the prevention of unauthorized disclosure of data known as?
Confidentiality
What scrambles data to make it unreadable by unauthorized entities?
Encryption
What does encryption do?
Scrambles data to make it unreadable by unauthorized entities
What does AES stand for?
Advanced Encryption Standard
What does DES stand for?
Data Encryption Standard
List three access control elements
- Identification
- Authentication
- Authorization
What is identification?
Unique attributes that make up an entity
What is Authentication?
The process of determining if an entity is who they claim to be
What is Authorization?
The process of determining what permission an entity has for data and systems
Match the term to the meaning
- Identification
- Authorization
- Authentication
A. The process of determining what permission an entity has for data and systems
B. The unique attributes that make up an entity
C. The process of determining if an entity is who they claim to be
1, B
2, A
3, C
Access controls are used to ______ and ______ access
A. Prevent, Protect
B. Grant, Restrict
C. Prime, Lock
D. Test, Break
B. Grant, Restrict
What is the best way to protect data confidentiality?
Encryption
Choose all answers that are true
Encryption is ____
A. The act of scrambling data to be unreadable to unauthorized users
B. Not used to secure data
C. The best way to protect data confidentiality
D. A protocol only used by hackers
A. The act of scrambling data to be unreadable to unauthorized users
and
C. The best way to protect data confidentiality
What helps to protect confidentiality?
Access controls
______ provides assurance that data has not changed
Integrity
What does integrity provide assurance of?
That data has not changed