Theorieen Uitgelegd Flashcards

1
Q

What is the CIA-triad?

A

The CIA triad is a fundamental concept in information security. It stands for three critical principles that guide efforts to keep data secure:

Confidentiality: Only authorized users and processes should be able to access or modify data.

Integrity: Data should be maintained in a correct state, and nobody should be able to improperly modify it, whether accidentally or maliciously.

Availability: Authorized users should be able to access data whenever they need to do so12.

Think of it as a three-legged stool: each principle supports the others, but sometimes they can be in opposition. Balancing these three aspects helps establish priorities when implementing security policies. So, next time you hear “CIA,” remember it’s not about spies—it’s about keeping data safe! 🕵️‍♂️🔒

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Public-key encryption?

A

Public key cryptography, also known as asymmetric cryptography, is a method used to secure data. Let me break it down for you:

Two Keys: Instead of using a single shared key, public key cryptography involves two separate keys:’

Public Key: This key is available for anyone to use.
Private Key: This key is kept secret and known only to the owner.

Encryption and Decryption:
Encryption: Data is encrypted using the public key. This means that only someone with the corresponding private key can decrypt and read the data.
Decryption: The private key is used to decrypt the data back into its original form.

Use Cases:
Public key cryptography is widely used, especially for TLS/SSL, which enables secure communication over the Internet (think HTTPS).
Websites use SSL/TLS certificates containing their public keys to establish secure connections with users. The private key remains on the server, ensuring confidentiality and integrity.

In summary: to send a secret message, I use your public key to lock the message so nobody else can read it. You then use your private key to unlock the message and read it. It’s like having a digital lock and key! 🔒🔑

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the TCP/IP layer

A

The TCP/IP model is a fundamental framework for data communication, especially on the Internet. Let’s break it down into simpler terms:

Purpose: The TCP/IP model helps devices communicate over large distances. It specifies how data should be:
Formatted
Addressed
Transmitted
Routed
Received at the destination

Layers: Unlike the OSI model with seven layers, the TCP/IP model has four layers (sometimes referred to as five):

Application Layer: Responsible for generating data and requesting connections.
Transport Layer (TCP/UDP): Ensures reliable data transfer.
Network/Internet Layer (IP): Handles addressing and routing.
Data Link Layer (MAC): Identifies the network protocol type (e.g., TCP/IP).

Data Division and Accuracy:
When you send something using the TCP/IP model, it divides the data into packets at the sender’s end.
These packets are recombined at the receiver’s end to reconstruct the original data.
This process ensures data accuracy during transfer2.

In summary, think of the TCP/IP model as a set of instructions for reliable communication across the vast digital landscape!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four perspectives on regulation of cyberspace?

A

Cyber Libertarianism:
Idea: Advocates for minimal government intervention in cyberspace.
Belief: The internet should remain a free and unregulated space, allowing individuals to interact without restrictions.
Critique: Critics argue that this approach may lead to security vulnerabilities, privacy breaches, and lack of accountability.

Techno-regulation:
Idea: Emphasizes using technology itself to regulate behavior.
Examples: Implementing encryption, firewalls, and access controls.
Critique: Sole reliance on technology may overlook human factors and context.

Territorialism:
Idea: Advocates for national sovereignty and jurisdictional boundaries.
Belief: Each country should regulate its own cyberspace according to its laws and norms.
Challenges: Global interconnectedness makes territorial boundaries less effective for digital issues.

Walled Gardens:
Idea: Refers to closed ecosystems controlled by specific entities (e.g., Apple’s iOS ecosystem).
Pros: Enhanced security, quality control, and user experience.
Cons: Limited choice, potential monopolies, and reduced innovation.
Remember, these perspectives shape how we navigate the digital landscape, balancing freedom, security, and governance! 🌐🔒

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is conformation bias?

A

Confirmation bias is when people tend to favor information that confirms their existing beliefs. Essentially, they look for evidence that supports what they already think, while ignoring information that contradicts their beliefs. This tendency often happens unintentionally and can lead to biased decision-making. For instance, if someone strongly believes that a certain diet is effective, they might only seek out information that supports that belief, even if there’s contradictory evidence

So, in a nutshell, confirmation bias is like putting on blinders and only seeing what aligns with our preconceived notions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cognitive Dissonance?

A

Cognitive dissonance is the mental discomfort that arises when a person holds conflicting beliefs, values, or attitudes. Imagine having two thoughts that don’t quite align—like wanting to be healthy but not exercising regularly. This inconsistency causes unease. To ease this discomfort, people might justify, ignore, or avoid information that challenges their existing beliefs. So, in a nutshell, it’s like having a mental tug-of-war between what we think and how we behave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Just-world hypothesis?

A

The Just-world Hypothesis is the belief that the world operates fairly, and people generally get what they deserve. Imagine it as a mental lens through which we view events: when something happens, we tend to attribute it to the person’s actions or character. If good things occur, we assume the person is deserving; if bad things happen, we may blame the victim, even when external factors are at play. So, in a nutshell, it’s like seeing the world as a cosmic scorekeeper, rewarding virtue and punishing transgressions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is fundamental attribution error in short and simple terms?

A

he fundamental attribution error is a cognitive bias in social psychology. It occurs when observers tend to:

  1. Overemphasize dispositional or personality factors when explaining someone else’s behavior (e.g., assuming someone is late because they’re selfish).
  2. Underemphasize situational or environmental factors (e.g., not considering that someone might be late due to traffic).

In other words, we often attribute people’s actions to their character rather than considering external circumstances. So next time someone is late, remember—it might not be entirely their fault! 🕰️🤷‍♂️

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Asch Experiment?

A

The Asch Conformity Experiment showed how people change their answers to match the majority, even when they know better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are heuristics?

A

Heuristics are mental shortcuts that allow individuals to make decisions, pass judgments, or solve problems quickly and with minimal mental effort. These rules-of-thumb help reduce cognitive load and come into play when people face complex problems or incomplete information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Theory of Planned Behavior?

A

The Theory of Planned Behavior (TPB) is a cognitive theory proposed by Azjen in 1985. It explains how an individual’s decision to engage in a specific behavior (such as gambling or stopping gambling) is influenced by their intention to perform that behavior. Here’s a concise breakdown:

Intentions: These capture the motivational factors that influence behavior. They indicate how hard people are willing to try and how much effort they plan to exert to perform a behavior. Stronger intentions lead to more likely behavior.

Variables:
Personal attitudes: Our overall attitude toward a behavior, including positive and negative aspects. For example, our attitude toward smoking might consider relaxation versus coughing and cost.

Subjective norms: How we perceive others’ attitudes about a behavior (e.g., family, friends, colleagues). It’s not what others think but our perception of their attitudes.

Perceived behavioral control: Our belief in controlling our behavior, influenced by internal factors (ability, determination) and external factors (resources, support).

Practical Applications: TPB has been used in health education campaigns, such as anti-drug efforts, to predict intentions and behavior related to smoking and other behaviors1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is The Health Belief Model?

A

The Health Belief Model (HBM) is a theory that helps predict health behaviors. Here’s the simple breakdown:

It focuses on four critical areas:
Severity of illness: How serious is the health threat?
Susceptibility: How likely are you to get the illness?
Benefits of preventive action: What are the advantages of taking action?
Barriers to action: What obstacles might prevent you from acting?

Prediction: If you believe you’re at risk and see benefits, you’re more likely to adopt healthy behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Protection Motivation Theory?

A

The Protection Motivation Theory (PMT) explains how people evaluate threats and decide whether to engage in protective behavior. Here’s a concise breakdown:

Threat Appraisal: This assesses the severity, vulnerability, and susceptibility of a threat. It focuses on understanding how serious the situation is and the likelihood of harm.

Coping Appraisal: This evaluates an individual’s ability to take action to avert or overcome the threat. It considers response efficacy (expectation that recommended action will remove the threat) and self-efficacy (belief in one’s ability to execute recommended actions successfully).

In essence, PMT helps us understand why people engage in certain behaviors and offers insights for behavior change. 🌟🏥

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the COM-B model?

A

Certainly! The COM-B model explains how behavior change occurs by considering three essential factors:

Capability (C): This refers to an individual’s ability—both psychological and physical—to engage in a specific behavior.
Opportunity (O): External factors that make a behavior possible or feasible.
Motivation (M): The conscious and unconscious cognitive processes that drive and inspire behavior 12.
In other words, for any behavior to change, we need a combination of capability, opportunity, and motivation. These components interact with each other to shape our actions. 🌟🧠

How well did you know this?
1
Not at all
2
3
4
5
Perfectly