Lesson 1.1 Information Security Fundamentals Flashcards Preview

CISSP Complete Video Course Second Edition > Lesson 1.1 Information Security Fundamentals > Flashcards

Flashcards in Lesson 1.1 Information Security Fundamentals Deck (16)
Loading flashcards...
1

What are the 3 main principles of cyber or information security?

Confidentiality, Integrity, Availability

2

This principle states that only authorized people, processes, or systems have access to information and that information must be protected from unauthorized disclosure.

Confidentiality

3

This principle states that data and systems should be protected from unintentional, unauthorized, or accidental changes.

Integrity

4

What are the two components to the principle of integrity?

Data Integrity and System Integrity

5

What does the data integrity component imply?

information is known to be good, and that information can be trusted as being complete, consistent, and accurate

6

What does the term system integrity imply?

that a system will work as intended

7

This principle states that information systems and supporting infrastructure are operating and accessible when needed.

Availability

8

In the availability principle, what is meant by information systems and supporting infrastructure?

systems, processes, people, and facilities

9

What are the five A's of critical supporting activities for CIA?

Accountability
Authentication
Authorization
Accounting
Assurance

10

the process of tracing actions to the source

accountability

11

the positive identification of a person or system who is seeking access to information or to a system

authentication

12

granting users and systems a predetermined level of access to resources

authorization

13

the logging of access and use of information resources

accounting

14

the processes we use to develop confidence that our security measures are working as intended

assurance

15

What is meant by the term trustworthy computing?

confidence that a system will act in a correct and predictable manner in every situation

16

Expanded view of information security to include external relationships and global threats

cybersecurity