Lesson 1.1 Information Security Fundamentals Flashcards

1
Q

What are the 3 main principles of cyber or information security?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This principle states that only authorized people, processes, or systems have access to information and that information must be protected from unauthorized disclosure.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This principle states that data and systems should be protected from unintentional, unauthorized, or accidental changes.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two components to the principle of integrity?

A

Data Integrity and System Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the data integrity component imply?

A

information is known to be good, and that information can be trusted as being complete, consistent, and accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the term system integrity imply?

A

that a system will work as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This principle states that information systems and supporting infrastructure are operating and accessible when needed.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the availability principle, what is meant by information systems and supporting infrastructure?

A

systems, processes, people, and facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five A’s of critical supporting activities for CIA?

A
Accountability
Authentication
Authorization
Accounting
Assurance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the process of tracing actions to the source

A

accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the positive identification of a person or system who is seeking access to information or to a system

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

granting users and systems a predetermined level of access to resources

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the logging of access and use of information resources

A

accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the processes we use to develop confidence that our security measures are working as intended

A

assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is meant by the term trustworthy computing?

A

confidence that a system will act in a correct and predictable manner in every situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Expanded view of information security to include external relationships and global threats

A

cybersecurity