CIA Triad Concept Flashcards

1
Q

Prevents the disclosure of data to unauthorized people so that only authorized people have access to data.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

encryption uses one key, known as the secret key.

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

encryption uses two keys, known as the private key and the public key.

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This means that you know that data has not been altered or tampered with. We use a technique called hashing that takes the data and converts it into a numerical value called a hash or message digest.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which allows one or two disks to fail while still keeping the data available.

A

RAID Redundant Array Independent Disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

two servers can access the same data, and if one fails, the other can still provide the data, a data backup,

A

Fail Over Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

regulates the temperature for critical servers. In a datacentre, if the temperature is too hot then the servers will shut down.

A

HVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

where you give someone only the most limited access required so that they can perform their job role; this is known as a need-to-know basis.

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is the concept of protecting a company’s data with a series of protective layers so that if one layer fails, another layer will already be in place to thwart an attack.

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

written by managers to create organizational policies and procedures to reduce risk within companies. They incorporate regulatory frameworks so that the companies are legally compliant.

A

Managerial Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company will have a risk register where the financial director will look at all of the risks associated with money and the IT manager will look at all of the risks posed by the IT infrastructure.

A

Annual Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is not intrusive as it merely checks for vulnerabilities,

A

Vulnerability Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is more intrusive, as it goes deeper into a computer and can exploit vulnerabilities. It could cause the system to crash unexpectantly.

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

are executed by company personnel during their day-to-day operations.

A

Operational Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is an annual event in which you are reminded about what you should be doing each day to keep the company safe:

A

Annual Security Awareness Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a process that a company adopts so that changes made don’t cause any security risks to the company. A change to one department could impact another department.

A

Change management

17
Q

This is contingency planning to keep the business up and running when a disaster occurs by identifying any single point of failure that would prevent the company from remaining operational.

A

Business Continuity Plan:

18
Q

implemented by the IT team to reduce the risk to thebusiness.

A

Technical Controls

19
Q

Firewalls prevent unauthorized access to the network by IP address, application, or protocol.

A

Firewall Rules

20
Q

This is the most common threat to a business, and we must ensure that all servers and desktops are protected and up to date.

A

Antivirus Antimalware

21
Q

These log computers off when they are idle, preventing access.

A

Sreen saver

22
Q

These prevent people that are walking past from reading the data on your screen.

A

Screen Filter

23
Q

CCTV and motion sensors. When someone is walking past a building and the motion sensors detect them, it turns the lights on to deter them. A building with a CCTV camera in a prominent position and a sign warning people that they are being recorded

A

Deterrent Controls

24
Q

are used to investigate an incident that has happened and needs to be investigated;

A

Detective Control

25
Q

records events as they happen and from that, you can see who has entered a particular room or has climbed through a window at the rear of a building.

A

CCTV

26
Q

are the actions you take to recover from an incident. You may lose a hard drive that contained data; in that case, you would replace the data from a backup you had previously taken.

A

Corrective Controls

27
Q

form of corrective control. There may have been a fire in your data center that destroyed many servers, therefore, when you purchase replacement servers, you may install an oxygen suppressant system that will starve a fire of the oxygen needed.

A

Fire Suppression System

28
Q

can also be called Alternative or Secondary Controls and can be used instead of a primary control that has failed or is not available.

A

Compensating Controls

29
Q

are in place to deter any attack; this could be having a security guard with a large dog walking around the perimeter of your building. This would make someone trying to break in think twice about doing so.

A

Preventative Controls