Week 1 Notes Review Flashcards

1
Q

What is Cybersecurity

A

The collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyberspace environment and organizations and users’ assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

General Security Objectives

A

Confidentiality
Integrity
Availability

(Integrity includes data authenticity and non-repudiation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Security

A

refers to the preservation of confidentiality, integrity, and availability of information

(authenticity, accountability, non repudiation and reliability can also be included)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Security

A

protection of networks and their service from unauthorized modification, destruction, or disclosure

Assurance that the network performs its critical functions correctly and tehre are no harmful side effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality

A

Means that information
that should stay secret stays secret and only those persons authorized to access it may receive access. “

  • Seeks to prevent the unauthorized disclosure of information.
  • Keeps data secret.
  • Seeks to prevent unauthorized read access to data.
  • Example: Identity Theft (Personalized Identifiable Information – PII)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA Pillar

A

Info Sec, Governance, Policy -> Management of Info Sec

C - Computer Security
I - Data Security
A - Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integrity

A
  • Integrity in the information security context refers not only to integrity of information itself but also
    to the origin integrity—that is, integrity of the source of information.
  • Seeks to prevent unauthorized modification of information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A
  • Ensures the information / the system is available when needed.
  • There won’t be any downtime.

(Example: DDoS Attack Scenario)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly