Midterm Flashcards
C.I.A stands for…?
Confidentiality
Integrity
Availability
it offers a high level of assurance that data, objects, or resources are restricted from unauthorized subjects.
Confidentiality
Confidentiality and integrity depend on each other. Without object integrity, confidentiality cannot be maintained.
True or False?
True
Aspects of Confidentiality (8)
- Sensitivity
- Discretion
- Criticality
- Concealment
- Secrecy
- Privacy
- Seclusion
- Isolation
refers to the quality of information, which could cause harm or damage if disclosed. Maintaining confidentiality of sensitive information helps to prevent harm or damage.
Sensitivity
is an act of decision where an operator can influence or control disclosure in order to minimize harm or damage.
Discretion
The level to which information is mission critical is its measure of criticality. The higher the level of criticality, the more likely the need to maintain the confidentiality of the information.
Criticality
is the act of hiding or preventing disclosure.
is viewed as a means of cover, obfuscation, or distraction.
Concealment
is the act of keeping something a secret or preventing the disclosure of information.
Secrecy
refers to keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.
Privacy
involves storing something in an out-of-the-way location. This location can also provide strict access controls. Can help enforcement confidentiality protections.
Seclusion
is the act of keeping something separated from others.
Can be used to prevent commingling of information or disclosure of information.
Isolation
it offers a high level of assurance that the data, objects, and resources are unaltered from their original protected state.
Alterations should not occur while the object is in storage, in transit, or in process.
Integrity
Integrity can be examined from three perspectives: (3)
possible question? Not sure
- Preventing unauthorized subjects from making modifications.
- Preventing authorized subjects from making unauthorized modifications, such as mistakes
- Maintaining the internal and external consistency of objects so that their data is a correct and true relection of the real world.
Authorized subjects are granted timely
and uninterrupted access to objects.
Includes efficient uninterrupted access to objects and prevention of denial-of-service (DoS) attacks.
Availability