Chapter 1 Flashcards
CIA Triad
Confidentiality, integrity, availability
Confidentiality
Unauthorized individuals are not able to gain access to sensitive information
prevent using: fireballs, access control lists, and encryption
Integrity
No unauthorized modifications are made to information or systems
Prevent using: basing and integrity monitoring solutions
Availability
Information and systems are ready to meet the needs to legitimate users when they are requested
Prevent using: fault tolerance, clustering, and backups
Security incidents
Organizations experience a breach of the CIA triad of information or information systems
DAD Triad
Three key threats to cybersecurity efforts: disclosure, alteration, denial
Disclosure
Exposure if sensitive information to unauthorized individuals, violating confidentiality
Alteration
Unauthorized modification of information violating integrity
Denial
Unintended disruption of an authorized users legitimate access to information violating availability
Data exfiltration
Attacker gains access to sensitive information and removes It from the organization
Breach impact
Measured risk by: financial, reputations, strategic, operational, and compliance
Financial risk
Risk of monetary damage to the organization
Reputational risk
Negative publicity surrounding a breach causes loss of customers, employees, suppliers, and stakeholders
Strategic risk
Risk that an organization will become less effective in meeting major goals and objectives
Operational risk
Risk to the organizations ability to carry out day to day functions