comp security exam 1 Flashcards
What is the main focus of computer security?
The main focus of computer security is to keep computers their programs and the data they manage safe.
What are the three primary components of the CIA Triad in computer security?
The three primary components of the CIA Triad are Confidentiality Integrity and Availability.
Define confidentiality in the context of computer security.
Confidentiality ensures that information is protected from unauthorized access allowing only authorized users to view or modify it.
What is the relationship between privacy and confidentiality?
Privacy gives individuals control over their personal data focusing on how it is collected and shared and is a reason for confidentiality.
What does integrity refer to in computer security?
Integrity refers to the assurance that the information is accurate and untampered with meaning it is reliable and trustworthy.
What is meant by availability in the CIA Triad?
Availability refers to ensuring that authorized users have access to information and resources when needed.
Explain the term ‘unauthorized access’.
Unauthorized access refers to situations where individuals gain access to systems data or resources without the appropriate permissions or authority.
Why is safeguarding confidentiality important in computer security?
Safeguarding confidentiality is important to protect sensitive information from being accessed by unauthorized users which helps to maintain trust and compliance with privacy laws.
How does computer security affect individual privacy?
Computer security affects individual privacy by implementing measures to protect personal data thus ensuring that individuals have control over how their information is collected used and shared.
List some common threats to confidentiality in computer systems.
Common threats to confidentiality include unauthorized access data breaches phishing attacks malware and insider threats.
What strategies can be implemented to ensure confidentiality?
Strategies to ensure confidentiality include encryption access controls strong authentication methods and regular security audits.
Describe the concept of ‘data integrity’.
Data integrity ensures that the information stored in a computer system is accurate consistent and safeguarded against unauthorized alterations.
What methods can be used to protect data integrity?
Methods to protect data integrity include checksums hash functions digital signatures and access logs.
Why is availability crucial in a computer security context?
Availability is crucial as it guarantees that users can access critical systems and information when needed preventing disruptions that can affect business operations and services.
Identify factors that can impact availability in computer systems.
Factors that can impact availability include hardware failures service outages cyber attacks (like Distributed Denial of Service attacks) and natural disasters.
What role does risk assessment play in computer security?
Risk assessment helps to identify vulnerabilities threats and the potential impact on assets enabling organizations to prioritize security measures effectively.
How can organizations improve their security posture regarding confidentiality integrity and availability?
Organizations can improve their security posture by implementing comprehensive security policies investing in employee training deploying advanced security technologies and regularly reviewing and updating their security strategies.
What is a violation of confidentiality concerning medical records?
A protected file containing your medical records without proper access rights is a violation of confidentiality.
What does anonymity refer to in the context of personal identification?
Anonymity hides a person’s identity even if their actions are visible.
How is secrecy defined in the context of information management?
Secrecy involves the deliberate concealment of information for security or strategic reasons.
What constitutes a data breach?
A data breach occurs when unauthorized individuals access sensitive data which can happen due to hacking malware or poor security controls.
What are the potential consequences of a data breach?
Data breaches can expose personal financial or corporate information leading to identity theft or financial loss.
What is data exfiltration?
Data exfiltration is the unauthorized transfer of stolen data from a system often as part of a data breach.
How do attackers typically perform data exfiltration?
Attackers use malware phishing or compromised credentials to extract information for fraud or sale.