Chapter 1: Confidentiality, Integrity, Availability, and Non-repudiation Flashcards
Understand the security Concepts of Information Assurance
What are the three main goals of the CIA Triad?
- Confidentiality
- Integrity
- Availability
{BLANK} ensures that only authorized individuals have access to information and resources.
Confidentiality
What are the major threats to confidentiality?
- Snooping
- Dumpster Diving
- Eavesdropping
- Wiretapping
- Social Engineering
The individual engaging in {BLANK} wanders around your ofiice or other facility and simply looks to see what information they can gather.
Snooping
What can organizations do to protect against snooping?
Enforce a clean desk policy
{BLANK} attacks also look for senstive materials, but the attacker doesn’t walk around the office; instead, they look through the trash, trying to find senstive documents that an employee threw in the garbage or recycling bin.
Dumpster Diving
What can organizations do to protect against dumpster diving?
Using a paper shredder
What are the two types of eavesdropping?
- Physical
- Electronic
In a physical eavesdropping attack, the attacker simply positions themselves where they can overhear conversations, such as in a cafeteria or hallway, and then listens for sensitive information.
How can an organization protect against this type of attack?
By putting rules in place limiting where sensitive conversations may take place.
Electronic eavesdropping attacks are also known as wiretapping. They occur when an attacker gains access ro a network and monitors the data being sent elctronically within an office.
What can an organization do to protect against this type of attack?
They can use encryption to protect information being sent over the network.
In a {BLANK} attack, the attacker uses psychological tricks to persuade an employee to give them sensitive information or access to internal systems.
Social Engineering
What is the best defense against social engineering?
The best defense against this attack is educating users to recognize the dangers of social engineering and empower them to intervene when they suspect an attack i staking place.
{BLANK} means there aren’t any unauthorized changes to information.
Integrity
What are the major threats to integrity?
- Unauthorized modification of information
- Impersonation attacks
- Man-in-the-middle (MitM) attacks
- Replay attacks
The {BLANK} occurs when an attacker gains access to a system and makes changes that violate a security policy.
Unauthorized Modification of Information