Lecture 1 Flashcards
What is Data?
Raw facts and figures without context
Examples include numbers, dates, and strings such as ‘192.168.0.1’ or ‘2024-08-12’.
What is Information?
Data that is processed and attributed meaning
Information is derived from data, such as knowing ‘Bob logged into the system’.
What is Information Security? Why is it important?
The Protection of digital information that has value to people and organizations. It’s important to protect sensitive data from threats, and ensure privacy.
Safeguarding data from unauthorized access and damage.
What are the three vectors of protection in Information Security?
Confidentiality, Integrity, Availability
Often referred to as the CIA Triad.
What does Confidentiality refer to in Information Security?
Only approved individuals may access information
It ensures that sensitive data is not disclosed to unauthorized parties.
What does Integrity refer to in Information Security?
Information is correct and unaltered
It ensures that data remains consistent and trustworthy.
What does Availability refer to in Information Security?
Information can be accessed by authorized individuals
It ensures that users can access information when needed.
What is an Asset in Information Security?
Item of value
Assets can include data, hardware, software, and intellectual property.
What is a Threat in Information Security?
Actions or events that have potential to cause harm
T/F - Threats purely refer to intentional actions that have potential to cause harm
False. Threats can be intentional or unintentional (e.g., natural disasters).
What is a Threat Agent?
Person or element with power to carry out a threat
Examples include cybercriminals, insiders, or natural phenomena.
What is a Vulnerability?
Flaw or weakness by which a threat agent can bypass security
Vulnerabilities can exist in software, hardware, or processes.
What is Risk in the context of Information Security?
Probability that a vulnerability can be exploited by a threat agent
Risk management involves assessing and mitigating potential threats.
What are the additional principles of Information Security?
Authenticity, Non-Repudiation
Authenticity ensures that subjects or objects are genuine, while non-repudiation means a subject cannot deny their signature on a document.
Fill in the blank: The three principles of Information Security are _______, ________, and ________.
Confidentiality, Integrity, Availability
True or False: Risk can be entirely eliminated in Information Security.
False
Risk cannot be eliminated entirely due to cost and time constraints.
What is Risk Residue?
Some degree of risk must be assumed
It refers to the remaining risk after all mitigation measures have been applied.