Module 2 - 02-2 Flashcards

The CIA Triad: Confidentiality, Integrity, and Availability

1
Q

Define Security Posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a core security model?

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define CIA Triad

A

A model that helps inform how organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CIA stand for?

A

i. Confidentiality
ii. Integrity
iii. Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three core principles of the CIA Triad?

A

i. Confidentiality
ii. Integrity
iii. Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Confidentiality

A

Only authorized users can access specific assets or data

Sensitive data should be available on a “need to know” basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What design principle can be implemented in an organization to enhance Confidentiality?

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define the Principle of Least Privilege

A

Limits users’ access to only the information they need to complete work-related tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Integrity

A

The data is verifiably correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example to verify data Integrity?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Cryptography

A

To transform data so unauthorized parties cannot read or tamper with it (NIST, 2022)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of how an organization might implement Integrity?

A

By enabling Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Encryption

A

The process of converting data from a readable format to an encoded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Availability

A

The data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The CIA triad is a model that helps inform how organizations consider _____ when setting up systems and security policies.

  • access
  • assets
  • data
  • risk
A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Match each CIA triad component to the correct scenario: You must use two-factor authentication before signing into an employee portal.
CIA triad component

Confidentiality
Integrity
Availability

A

Confidentiality

17
Q

Match each CIA triad component to the correct scenario:
You recently shopped at Store Y and verify you were charged correctly.
CIA triad component

Confidentiality
Integrity
Availability

A

Integrity

18
Q

Match each CIA triad component to the correct scenario:
You frequently sign into your bank account to check your balances.
CIA triad component

Confidentiality
Integrity
Availability

A

Availability

19
Q

What is the CIA triad?

A set of security controls used to update systems and networks
A foundational security model used to set up security policies and systems
Ongoing validation processes involving all employees in an organization
A mandatory security framework involving the selection of appropriate controls

A

The CIA triad is a foundational security model used to set up security policies and systems. The core principles of the model are confidentiality, integrity, and availability.

20
Q

Which element of the CIA triad specifies that only authorized users can access specific information?

Confidentiality
Confirmation
Integrity
Access

A

Confidentiality specifies that only authorized users can access specific information.

21
Q

A security analyst discovers that certain data is inaccessible to authorized users, which is preventing these employees from doing their jobs efficiently. The analyst works to fix the application involved in order to allow for timely and reliable access. Which element of the CIA triad does this scenario describe?

Applicability
Integrity
Capacity
Availability

A

Availability

This scenario describes availability. Availability specifies that data is accessible to authorized users.

22
Q

According to the CIA triad, _____ refers to ensuring that an organization’s data is verifiably correct, authentic, and reliable.

Availability
Accuracy
Credibility
Integrity

A

Integrity