Security Operations and Administration Flashcards

1
Q

Limits are placed on who is allowed to view information, including copying it to another form.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The information stays complete and correct when retrieved, displayed, or acted upon.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The information is presented to the user in a timely manner when required and in a form and format that meets the user’s needs.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Only previously approved, known, and trusted users or processes have been able to create, modify, move or copy the information.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The content of the information, its form and content, and its presentation or delivery to the user meets the user’s needs.

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The information is legally owned or held by a known, authorized user, such that the user has authority to exert control over its use, access, modification, or movement.

A

Possession or Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The System and its information, by design, do not cause unauthorized harm or damage to others, their property, or their lives

A

Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information that attests to or relates to the identity of a person, or links specific activities to that identity, must be protected from being accessed, viewed, copied, modified, or otherwise used by unauthorized persons or systems.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User who created, used, viewed, or accessed the information, or shared it with others, cannot later deny that they did so.

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The information can be reviewed, audited, and made visible or shared with competent authorities for regulatory, legal, or other processes that server the public good.

A

Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality, Integrity, and availability

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality, integrity, availability, nonrepudiation, and authentication

A

CIANA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Confidentiality, integrity, availability, nonrepudiation, authentication, privacy, and security

A

CIANA+PS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality, integrity, availability, authenticity, utility, and possession or control

A

Parkerian Hexad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information that you have, own, or create, and that you share with someone else with the agreement that they cannot share that knowledge with anyone else without your consent or without due process of law.

A

Privileged Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any person or any group of people who could learn something from our confidential information and then use that new knowledge in ways that would thwart our plans to attain our objectives or cause us other harm

A

Unauthorized People

17
Q

Information and Processes must be complete, correct, function together correctly, and do so in reliable, repeatable, and deterministic ways for the overall system.

A

Integrity

18
Q

Consists of the individual facts, observations, or elements of a measurement, such as a person’s name or their residential address.

A

Data

19
Q

Process data in various ways; Is the conclusion or inferences from data

A

Information

20
Q

General conclusions or principles that you’ve derived from lots of information

A

Knowledge

21
Q

Insightful application of knowledge

A

Wisdom

22
Q

Information that is used to identify, locate, or contact a specific person

A

PII or Personal Identifiable Information

23
Q

Information regarding that person that has not been made public and is not required to be made public

A

Nonpublished Personal Information

24
Q

Design and operational principle requires that any given system element has the minimum level of authority and decision-making capability that the specifically assigned task requires, and no more

A

Least Privilege

25
Q
A