Chapter 1 Flashcards

1
Q

What is the CIA triad

A

Confidentiality

Integrity

Availablity

of data and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality

A

Resitrictions on information, access, and disclosure including means to protect personal privacy and propietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is integrity

A

guarding agains improper information modification or destruction ensuring information nonrepudation and authentticiy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is availablity

A

ensuring timely and reliable access to and use information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a secuity policy

A

a set of practices and rules that specify and regulate how a system or organization provides security services to protect senstiive and critial system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are 4 assets of a computer system, (components)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of vulnerability is corrupted data

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what type of vulnerability is leaky

A

loss of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a passive attack

A

attempt to learn or make use of information from the sys that does not affect sys resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is an active attack

A

attempt to alter sys resources or affect their operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 ways to deal with secutiy attacks

A

prevent, detect, recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is unauthorized disclousure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is deception (type of threat)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is disruption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is usurpation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the threat consequence of the following attacks

A

unauthorized disclosure

17
Q

what is the threat consequence of the following attacks

A

deception

18
Q

what is the threat consequence of the following attacks

A

disruption

19
Q

what is the threat consequence of the following attacks

A

usurpation

20
Q

what type of attack is this (active or passive)

A

passive attack

21
Q

what type of attack is this (active or passive)

A

passive

22
Q

what type of attack is this (active or passive)

A

passive

23
Q

what type of attack is this (active or passive)

A

active

24
Q

what type of attack is this (active or passive)

A

active

25
Q

what is an attack surface

A

the reachable and exploitable vulnerability in a system

26
Q

what type of attack surface is this

A

network

27
Q

what type of attack surface is this

A

software

28
Q

what type of attack surface is this

A

human

29
Q
A