CIA Triad: Principles of Information Security Flashcards

CIA Triad: Principles of Information Security (20 cards)

1
Q

What does the CIA Triad stand for in cybersecurity?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goal of Confidentiality in cybersecurity?

A

To ensure that information is only accessible to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary purpose of Integrity in information security?

A

To protect information from being altered or tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Availability ensure in the context of the CIA Triad?

A

That data and systems are accessible when needed by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give an example of a confidentiality control.

A

Encryption of sensitive files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a common threat to Integrity?

A

Unauthorized data modification or file corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a DDoS attack affect the CIA Triad?

A

It impacts Availability by overwhelming resources and making services unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a strong password help with Confidentiality?

A

It prevents unauthorized access to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a hash function primarily used for in the CIA Triad?

A

Ensuring Integrity by verifying that data has not changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which part of the CIA Triad does backup and disaster recovery support?

A

Availability – ensuring data can be restored and accessed after incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is access control important for Confidentiality?

A

It limits access to data only to those who are authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What role do digital signatures play in the CIA Triad?

A

They support Integrity and also Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What CIA Triad principle does file permissions enforce?

A

Confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do firewalls help enforce the CIA Triad?

A

By restricting access (Confidentiality) and protecting availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of attack violates Confidentiality?

A

Eavesdropping or man-in-the-middle (MITM) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of control supports data Integrity during file transfer?

A

Checksums or cryptographic hashes.

17
Q

What is the impact of ransomware on the CIA Triad?

A

It affects all three: encrypts files (Confidentiality), corrupts them (Integrity), and denies access (Availability).

18
Q

Which CIA Triad principle is impacted when a system crashes unexpectedly?

A

Availability.

19
Q

How do redundant systems support Availability?

A

They ensure services remain accessible even if one system fails.

20
Q

What is the consequence of failing to enforce Confidentiality in a SOC?

A

Data leaks or breaches exposing sensitive information.