Chapter 1 Flashcards
In the first section of this chapter, you will learn about the basic objectives of cybersecurity: confidentiality, integrity, and availability of your operations. In the sections that follow, you will learn about some of the controls that you can put in place to protect your most sensitive data from prying eyes. This chapter sets the stage for the remainder of the book, where you will dive more deeply into many different areas of cybersecurity
The three key objectives of cybersecurity programs are?
confidentiality, integrity, and availability
Confidentiality ensures that?
unauthorized individuals are not able to gain access to sensitive information
Integrity ensures that?
there are no unauthorized modifications to information or systems, either intentionally or unintentionally.
Availability ensures that?
information and systems are ready to meet the needs of legitimate users at the time those users request them
what is Nonrepudiation?
Nonrepudiation means that
someone who performed some action, such as sending a message, cannot later deny having taken that action
what is a common example of nonrepudiation?
Digital Signatures
The three key threats to cybersecurity programs are?
disclosure, alteration, and denial. (DAD)
Disclosure is also known as?
Data Loss
Disclosure is a violation of which principle?
Confidentiality
what is the full meaning of PII?
Personal Identifiable Information
what is the full meaning of AUP?
Acceptable Use Policy
HIPAA stands for?
Health Insurance Portability and Accountability Act
——– controls enforce confidentiality, integrity, and
availability in the digital space
Technical
examples of technical controls are:
firewall rules, access control lists, intrusion prevention systems, and encryption
Operational controls are?
the processes that we put in place to manage technology in a secure manner.