CIA Triad - Confidentiality, Integrity, and Availability Flashcards

1
Q

Confidentiality

A

seeks to prevent the unauthorized disclosure of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

seeks to prevent unauthorized modification of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

ensure authorized people can access the data they need, when they need to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Triad OR (AIC)

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability - Threats

A
Malicious attacks (DDOS, physical, system compromise, staff)
Application failures (error in the code)
Component failure (hardware)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability - Defense

A

IPS/IDS
Patch Management
Redundancy on hardware power (Multiple power/supplies/UPS’/generators Disks (RAID), Traffic paths (network design), HVAC, staff, HA (high availability)
SLAs - How high uptime we want (99.%9) - ROI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

it keeps data secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A

Seeks to ensure data that is written in an authorized manner is complete and accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Subject

A

An active entity on an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Object

A

a passive data file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Annualized Loss Expectancy

A

the cost of lose due to a risk over a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat

A

a potentially negative occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability

A

a weakness in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk

A

a matched threat and vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Safeguard

A

a measure taken to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidentially – EXAMPLE

A

A confidentially attack would be the theft of Personally Identifiable Information (PII), such as credit card information

17
Q

Data Integrity

A

seeks to protect information against unauthorized modification

18
Q

System Integrity

A

seeks to protect a system

19
Q

System Integrity - threat

A

If a user installs malicious software on the system to allow future “back door” access, they have violated the systems integrity

20
Q

Data Integrity - threat

A

If an unethical student compromises a college grade database to raise their grades, they have violated the data integrity

21
Q

What does the acronym DAD stand for?

A

Disclosure, Alteration, Destruction

22
Q

Disclosure

A

Unauthorized release of information

23
Q

What does Alteration mean?

A

the unauthorized modification of data

24
Q

Authorization - Actions

A

Actions may include reading, writing, or executing files or programs.

25
Q

What does Destruction reference/mean in security?

A

making a system or data unavailable

26
Q

Identity and Authentication

A

Proving an identity claim is called authentication; to authenticate the identity claim, usually by supplying a piece of information or an object that only an individual possess.

27
Q

What does Authorization mean in security?

A

the actions you can perform on a system once you have been identified and authenticated.