Ch2 - 2.01 - Goals of Information Security Flashcards

1
Q

Confidentiality

A

One of the goals of information security is to ensure confidentiality such that only authorized persons can gain access to information and are able to read
the information. A number of technologies such as permissions and encryption could be used to keep information confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

The concept of data integrity is to ensure that when data is sent from a source to a destination, the information received at the destination has not been altered in transit. Data integrity also means that if you store a file on the drive and open it later, you can be certain that the data has not been altered while in storage.

Another point to make about data integrity is that implementing solutions such as permissions can help protect the data integrity of information, because if you control who is allowed to modify the data, you can then protect it from unauthorized changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Availability, the third fundamental goal of information security in the CIA triad, is the concept of ensuring that the information is available when the user wants it. This is an often overlooked aspect of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability - Popular Solutions

A
  1. Permissions
  2. Backups
  3. Fault tolerance
  4. Clustering
  5. Patching
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accountability

A

Accountability is ensuring that users are accountable for their actions—if someone inappropriately deletes a file, for example, a record of that action exists to hold them accountable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accountability - Popular Methods

A
  1. Log Files
  2. Audit Files
  3. Firewalls and Proxy Servers
  4. Application Logging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly