Module 01 Flashcards

(25 cards)

1
Q

What is the information security triad?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality

A

Protection of an asset from improper disclouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the breaches of confidentiality and examples of these

A

Intentional or Accidental, accessing unauthorized channels, showing information on displayed screens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the effects of a confidentiality breach?

A

Legal penalties, , financial penalties, reputational damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are ways to enforce confidentiality?

A

Obfuscation (making something obscure, unintelligible),
Encryption (information is converted into a secret code), Masking (censor information), Tokenization (substitute an identifier)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is integrity?

A

Ensuring the accuracy, precision, and trust worthiness of information system processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are breaches of integrity?

A

Unauthorized modifications
- intentional
- accidental
- transmission error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the effect of integrity breaches?

A

Damage to equipment and processes, life safety, and breach of contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you ensure integrity?

A

Separation of duties, and digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you enforce integrity?

A

Policies, access control, input validation, audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is availability?

A

Ensuring that the resource is accessible is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are breaches of availability?

A

Intentional ( DoS, DDoS, Malware, Sabotage), Accidental (deletion of wrong file, misconfiguration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are breaches of availability?

A

Hardware and software failure, natural events and utility failure (internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the effect of lost availability?

A

life safety and interruption to business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you ensure availability?

A

Replication, redundancy, clustering, scalability, resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you enforce availability?

A

Policies, access control and architecture

17
Q

What is non-repudiation?

A

To establish proof that links an action to a specific identity

18
Q

What are breaches of non-repudiation?

A

inability to link an activity to an identified user and an invalid user

19
Q

What is the effect of repudiation?

A

Loss of trust, lack of evidence, breach of contract

20
Q

How do you ensure non-repudiation?

A

Access controls, digital signatures

21
Q

How do you enforce non-repudiation?

A

Policies, certificates, logging

22
Q

What is due care?

A

Having reasonable processes in place to continually protect IT assets

23
Q

What is due diligence?

A

The Enforcement of the principles of due care

24
Q

How do you balance information security and access?

A

Achieve proper balance (security has reasonable access but also there’s security against the threat) even though imbalances may occur

25
What is negligence?
The failure of due care and due diligence