Week 1 Flashcards

(15 cards)

1
Q

What is the CIA triad in Information Security?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define “Asset” in the context of information security.

A

Anything that has value to the organisation, its business operations and its continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a “Threat”?

A

A potential cause of an incident that may result in harm to a system or organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a “Vulnerability”?

A

A weakness of an asset or group of assets that can be exploited by one or more threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is “Impact” defined in Information Security?

A

The result of an information security incident, caused by a threat, which affects assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is “Risk” calculated?

A

Risk = Likelihood x Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name categories of Information System assets.

A

Primary assets (business processes & information); Supporting assets (hardware, software, network, personnel, site, organisation’s structure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four types of governance documents?

A

Policies, Standards, Guidelines, Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does SETA stand for and why is it important?

A

Security, Education, Training and Awareness - programmes to equip staff with knowledge and skills to perform their duties securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe one way that improving confidentiality can impact availability.

A

Disk-encryption may slow down access, causing user frustration through protecting data confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Information Security Governance?

A

How organisations control, direct and communicate their cybersecurity risk management activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List two common access control strategies.

A

(1) Authentication
(2) Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can cryptography help protect information assets?

A

By transforming data into unreadable form (encryption) and ensuring integrity (digital signatures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the first step in incident response?

A

Rapid detection of incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give an example of how a personnel error can compromise information security.

A

Leaking an access code may allow an unauthorised person into a secure area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly