IT Fundamentals Flashcards
Availability =
ensures systems and information remain available for authorized users. making sure systems and data are accessible at the time users need them
Integrity =
Protect against unauthorized changes to information. Insuring information is recorded, used and maintained in a way that ensures its: completeness, accuracy, internal consistency, and usefulness for a stated purpose
Confidentiality =
permitting authorized access while protecting against improper disclosure - protecting information and resources from unauthorized access
Business Continuity Scope (3)
- Activities (that will be covered)
- Systems (that will be covered)
- Controls (that will be implemented)
2 main tools for availability
Redundancy and Fault Tolerance
Redundancy =
ensuring a system can survive a single point of failure
RAID =
Redundant Arrays of Inexpensive Disks
Disaster Recovery (4)
Contain the damage; assess the damage; come up with a plan; prioritize the restoration of the most critical systems
5 main threats to confidentiality:
- Snooping 2. Dumpster Diving 3. Eavesdropping 4. Wiretapping (electronic eavesdropping) 5. Social Engineering
4 main integrity attacks:
1 Unauthorized Modification of Information 2 Impersonation 3 Man-in-the-Middle (MITM) 4 Replay
5 different types of events that can disrupt availability
1 Denial of Service (DDoS) Attacks 2 Power Outages 3 Hardware Failures 4 Destruction of Equipment 5 Service Outages