Foundations of Data Protection and IT Security Flashcards
What is the difference between Information Security and Cyber Security?
Information Security: is used to secure data in its analogous form.
Cyber Security: tries to protect information that is vulnerable through the use of information and communication technology.
What are the CIA triad of Cyber Security?
Cyber Security is put in place to protect the confidentiality, integrity, and availability of information.
Define Confidentiality in Cyber Security?
It means that information is only made available to those authorized to have access.
What could be the Consequences of an Attack on Confidentiality!
An attack on confidentiality could lead to the unintended disclosure of a customer database that is stored on a cloud storage space.
Define Integrity in Cyber Security?
The maintenance and assurance of the accuracy and completeness of information over its entire life cycle.
Give an example of an Attack on Integrity!
A hacker who, changes marks in a university information system to increase a student’s grades.
Give an example of an Attack on Integrity!
A hacker who, changes marks in a university information system to increase a student’s grades.
Give an example of an Attack on Availability!
distributed denial of service (DDoS), rendering the system unavailable for use.
Give an example of an Attack on Availability!
distributed denial of service (DDoS)
What is Resilience in Cyber Security?
Ensures that systems are built to withstand an attack or outage.
What is Authenticity in Cyber Security?
Ensures that personnel and users are who the say the are.
What is Authenticity in Cyber Security?
Ensures that personnel and users are who the say the are.
What is Non repudiation in Cyber Security?
Means that a person cannot deny having taken action.
What does a structured risk management process, consists of?
- identification of risk,
- analysis of risk,
- mitigation of risk
- reporting risks.
What are the eight cyber security domains according to (ISC)^2?
- security and risk management.
- asset security
- security architecture and engineering.
- communication and network security.
- identity and access management.
- security assessment and testing.
- security operations.
- software development security.