What is Information Security Flashcards

1
Q

What are the three elements of the CIA Triad?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define “Information Security”.

A

Information security is the protection of information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of Information Security?

A

The primary goal of information security is to ensure the confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat in Information Security?

A

A threat is any potential danger that can exploit a vulnerability to breach security and cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a vulnerability in the context of Information Security.

A

A vulnerability is a weakness in a system that can be exploited by a threat to gain unauthorized access or cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Confidentiality in the CIA Triad?

A

Ensures that only authorized users can access sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Integrity in the CIA Triad?

A

Ensures that data is accurate and unaltered unless changed by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is availability in the CIA Triad?

A

Ensures that data and systems are accessible when needed by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Are the six elements of the Parkerian Hexad?

A

Confidentiality, Integrity, Availability, Possession/Control, Authenticity, Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Possession/Control in the Parkerian Hexad?

A

Ensures that an entity physically or digitally controls data, even if confidentiality is maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authenticity in the Parkerian Hexad?

A

Ensures that data and identities are genuine and not forged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Utility in the Parkerian Hexad?

A

Ensures that data is useful and in a readable format when accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four types of attacks?

A

Interception, Interruption, Modification, Fabrication,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a risk in Information Security?

A

The likelihood and impact of a threat exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an impact in Information security

A

The consequence or damage if a threat successfully exploits a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the steps of the Risk Management process?

A

Identify assets
Identify threats
Assess vulnerabilities
Assess risk
Mitigate risk
Monitor and Review

17
Q

What are the six steps of the Incident Response Process?

A

Preparation
Detection & Analysis
Containment
Eradication
Recovery
Post-Incident Activity

18
Q

What is the goal of Risk Management?

A

To identify, assess, and mitigate risks to minimize potential security threats.

19
Q

What is a risk assessment?

A

A detailed evaluation of threats, vulnerabilities, and impacts to determine risk levels.

20
Q

What is a Business Impact Analysis (BIA)?

A

A process to determine how risks affect business operations.

21
Q

What is the difference between qualitative and quantitative risk analysis?

A

Qualitative = Subjective ranking of risks (e.g., low, medium, high).
Quantitative = Numerical risk measurement (e.g., financial loss in dollars).

22
Q

What is the goal of the Incident Response Process?

A

To detect, contain, and recover from security incidents efficiently to minimize damage.

23
Q

What are the three main types of security controls?

A

Administrative Controls – Policies and procedures.
Technical Controls – Security technologies (firewalls, encryption).
Physical Controls – Security measures for physical assets (locks, cameras).

24
Q

What is Defense in Depth (DiD)?

A

A layered security approach that uses multiple security controls to protect systems so that if one control fails, others remain in place.

25
Q

What are the layers of the Defense in Depth?

A

Data Layer – Protects sensitive data itself.
Application Layer – Secures software applications.
Host Layer – Protects endpoints like servers and workstations.
Internal Network Layer – Monitors and controls internal network traffic.
Perimeter Layer – Secures the boundary between internal and external networks.
External Network Layer – Protects against external threats (internet-facing defenses).

26
Q

Which type of attack only affects Confidentiality?

A

Interception.

27
Q

What type of attack affects Integrity and Availbility?

A

Interruption
Modification
Fabrication

28
Q

What is a Fabrication attack? Give some examples

A

An attack where false or counterfeit data is inserted into a system.

Example: Email spoofing, generating fake log entries.

29
Q

What is a Modification attack? Give some examples.

A

A: An attack where data is altered, tampered with, or changed without authorization.

Example: Unauthorized file editing, SQL injection.

30
Q

What is an Interruption attack? Give some examples.

A

An attack that makes assets unavailable or unusable.

Example: Denial-of-Service (DoS) attack, ransomware.

31
Q

What is an Interception attack? Give some examples

A

an attack where an unauthorized party gains access to data, applications, or systems.

Example: Eavesdropping on network traffic, Man-in-the-Middle (MitM) attack.