Lecture 1 Flashcards

1
Q

What is Data?

A

Raw facts and figures without context

Examples include numbers, dates, and strings such as ‘192.168.0.1’ or ‘2024-08-12’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information?

A

Data that is processed and attributed meaning

Information is derived from data, such as knowing ‘Bob logged into the system’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Information Security? Why is it important?

A

The Protection of digital information that has value to people and organizations. It’s important to protect sensitive data from threats, and ensure privacy.

Safeguarding data from unauthorized access and damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three vectors of protection in Information Security?

A

Confidentiality, Integrity, Availability

Often referred to as the CIA Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Confidentiality refer to in Information Security?

A

Only approved individuals may access information

It ensures that sensitive data is not disclosed to unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Integrity refer to in Information Security?

A

Information is correct and unaltered

It ensures that data remains consistent and trustworthy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Availability refer to in Information Security?

A

Information can be accessed by authorized individuals

It ensures that users can access information when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Asset in Information Security?

A

Item of value

Assets can include data, hardware, software, and intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Threat in Information Security?

A

Actions or events that have potential to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F - Threats purely refer to intentional actions that have potential to cause harm

A

False. Threats can be intentional or unintentional (e.g., natural disasters).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Threat Agent?

A

Person or element with power to carry out a threat

Examples include cybercriminals, insiders, or natural phenomena.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Vulnerability?

A

Flaw or weakness by which a threat agent can bypass security

Vulnerabilities can exist in software, hardware, or processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Risk in the context of Information Security?

A

Probability that a vulnerability can be exploited by a threat agent

Risk management involves assessing and mitigating potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the additional principles of Information Security?

A

Authenticity, Non-Repudiation

Authenticity ensures that subjects or objects are genuine, while non-repudiation means a subject cannot deny their signature on a document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: The three principles of Information Security are _______, ________, and ________.

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: Risk can be entirely eliminated in Information Security.

A

False

Risk cannot be eliminated entirely due to cost and time constraints.

17
Q

What is Risk Residue?

A

Some degree of risk must be assumed

It refers to the remaining risk after all mitigation measures have been applied.