cia triad Flashcards
(25 cards)
What does the ‘C’ in the CIA triad stand for?
Confidentiality
What does the ‘I’ in the CIA triad stand for?
Integrity
What does the ‘A’ in the CIA triad stand for?
Availability
True or False: The CIA triad is a model for understanding information security.
True
Fill in the blank: The principle of __________ ensures that information is not disclosed to unauthorized individuals.
Confidentiality
Which component of the CIA triad ensures that information is accurate and trustworthy?
Integrity
Multiple Choice: Which of the following is NOT one of the components of the CIA triad? A) Confidentiality B) Integrity C) Authenticity D) Availability
C) Authenticity
True or False: Availability in the CIA triad means ensuring that data is accessible when needed.
True
What is one method to ensure confidentiality?
Encryption
Fill in the blank: __________ refers to the protection of information from unauthorized alteration.
Integrity
Which CIA triad component is primarily concerned with uptime and service continuity?
Availability
Multiple Choice: Which of the following best describes integrity? A) Keeping data secure B) Ensuring data is correct and unaltered C) Making sure data is available D) None of the above
B) Ensuring data is correct and unaltered
True or False: Data backup is a technique used to enhance availability.
True
What role does access control play in the CIA triad?
It helps maintain confidentiality by restricting access to information.
Fill in the blank: The process of __________ involves verifying that data has not been changed during transmission.
Integrity checking
Multiple Choice: Which action would violate confidentiality? A) Encrypting data B) Sharing passwords C) Implementing firewalls D) Regular audits
B) Sharing passwords
What is a common threat to data integrity?
Malware and unauthorized modifications
True or False: High availability means that a system is operational 99% of the time.
False
What is the primary goal of the CIA triad?
To provide a comprehensive framework for information security.
Fill in the blank: __________ is the practice of ensuring that only authorized users can access certain data.
Access control
Multiple Choice: Which of the following is a measure to ensure data availability? A) Data encryption B) User authentication C) Load balancing D) Data masking
C) Load balancing
What is the impact of a breach in confidentiality?
Unauthorized access to sensitive information.
True or False: The CIA triad can be applied to both digital and physical security.
True
What is one example of a tool used to maintain integrity?
Checksums