CIA Triad Flashcards

1
Q

What is the CIA triad and why is it important in cybersecurity?

A

The CIA triad is a model used to guide information security policies and practices. It stands for Confidentiality and Availability

and it is important in cybersecurity because it helps ensure that data is kept secure from unauthorized access

that data remains accurate and consistent

and that data is available when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

> How does encryption help maintain confidentiality in the CIA triad?

A

Encryption helps maintain confidentiality in the CIA triad by scrambling data so that it is unreadable to anyone without the correct decryption key. This ensures that only authorized individuals can access the data preventing unauthorized access and protecting it from malicious actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can you give an example of how data integrity could be compromised?

A

Data integrity can be compromised when unauthorized users gain access to sensitive information such as passwords or financial records. Additionally data integrity can also be compromised if the data is corrupted due to a virus or other malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is access control crucial to ensuring confidentiality?

A

Access control is essential to ensuring confidentiality because it limits who can access sensitive data. It also helps to prevent unauthorized access which can lead to data breaches and other security issues. Access control also allows organizations to monitor and audit user activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some common ways attackers try to compromise availability?

A

Attackers commonly try to compromise availability by launching distributed denial of service (DDoS) attacks exploiting vulnerabilities in web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you ensure the availability of critical systems during a cyber attack? To ensure the availability of critical systems during a cyber attack

A

I would recommend implementing a robust backup and disaster recovery plan. This should include regular backups of data and systems it is important to have a system in place to detect and respond quickly to any suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between privacy and confidentiality in the CIA triad?

A

The CIA triad is a model used to describe the three main components of information security: confidentiality integrity while privacy is the right of individuals to control how their personal information is collected and used. Confidentiality focuses on protecting data from external threats

while privacy focuses on protecting individuals from misuse of their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you ensure data is not tampered with during transmission?

A

To ensure data is not tampered with during transmission encryption can be used to scramble the data so that it is unreadable to anyone who does not have the key. Additionally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What measures can you take to protect against insider threats to the CIA triad?

A

To protect against insider threats to the CIA triad organizations should implement a combination of technical and physical security measures. This includes using strong authentication protocols

monitoring user activity

and limiting access to sensitive data. Additionally

organizations should have a clear policy on acceptable use of resources and ensure that all employees are aware of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it important to consider all three elements of the CIA triad when implementing security measures? I

A

t is important to consider all three elements of the CIA triad when implementing security measures because they are the foundation of a secure system. The Confidentiality element ensures that only authorized users can access sensitive data while Integrity ensures that data is not modified or corrupted in any way. Finally these three elements provide a comprehensive approach to security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly