What is Information Security Flashcards

(31 cards)

1
Q

What are the three elements of the CIA Triad?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define “Information Security”.

A

Information security is the protection of information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of Information Security?

A

The primary goal of information security is to ensure the confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat in Information Security?

A

A threat is any potential danger that can exploit a vulnerability to breach security and cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a vulnerability in the context of Information Security.

A

A vulnerability is a weakness in a system that can be exploited by a threat to gain unauthorized access or cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Confidentiality in the CIA Triad?

A

Ensures that only authorized users can access sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Integrity in the CIA Triad?

A

Ensures that data is accurate and unaltered unless changed by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is availability in the CIA Triad?

A

Ensures that data and systems are accessible when needed by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Are the six elements of the Parkerian Hexad?

A

Confidentiality, Integrity, Availability, Possession/Control, Authenticity, Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Possession/Control in the Parkerian Hexad?

A

Ensures that an entity physically or digitally controls data, even if confidentiality is maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authenticity in the Parkerian Hexad?

A

Ensures that data and identities are genuine and not forged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Utility in the Parkerian Hexad?

A

Ensures that data is useful and in a readable format when accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four types of attacks?

A

Interception, Interruption, Modification, Fabrication,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a risk in Information Security?

A

The likelihood and impact of a threat exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an impact in Information security

A

The consequence or damage if a threat successfully exploits a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the steps of the Risk Management process?

A

Identify assets
Identify threats
Assess vulnerabilities
Assess risk
Mitigate risk
Monitor and Review

17
Q

What are the six steps of the Incident Response Process?

A

Preparation
Detection & Analysis
Containment
Eradication
Recovery
Post-Incident Activity

18
Q

What is the goal of Risk Management?

A

To identify, assess, and mitigate risks to minimize potential security threats.

19
Q

What is a risk assessment?

A

A detailed evaluation of threats, vulnerabilities, and impacts to determine risk levels.

20
Q

What is a Business Impact Analysis (BIA)?

A

A process to determine how risks affect business operations.

21
Q

What is the difference between qualitative and quantitative risk analysis?

A

Qualitative = Subjective ranking of risks (e.g., low, medium, high).
Quantitative = Numerical risk measurement (e.g., financial loss in dollars).

22
Q

What is the goal of the Incident Response Process?

A

To detect, contain, and recover from security incidents efficiently to minimize damage.

23
Q

What are the three main types of security controls?

A

Administrative Controls – Policies and procedures.
Technical Controls – Security technologies (firewalls, encryption).
Physical Controls – Security measures for physical assets (locks, cameras).

24
Q

What is Defense in Depth (DiD)?

A

A layered security approach that uses multiple security controls to protect systems so that if one control fails, others remain in place.

25
What are the layers of the Defense in Depth?
Data Layer – Protects sensitive data itself. Application Layer – Secures software applications. Host Layer – Protects endpoints like servers and workstations. Internal Network Layer – Monitors and controls internal network traffic. Perimeter Layer – Secures the boundary between internal and external networks. External Network Layer – Protects against external threats (internet-facing defenses).
26
Which type of attack only affects Confidentiality?
Interception.
27
What type of attack affects Integrity and Availbility?
Interruption Modification Fabrication
28
What is a Fabrication attack? Give some examples
An attack where false or counterfeit data is inserted into a system. Example: Email spoofing, generating fake log entries.
29
What is a Modification attack? Give some examples.
A: An attack where data is altered, tampered with, or changed without authorization. Example: Unauthorized file editing, SQL injection.
30
What is an Interruption attack? Give some examples.
An attack that makes assets unavailable or unusable. Example: Denial-of-Service (DoS) attack, ransomware.
31
What is an Interception attack? Give some examples
an attack where an unauthorized party gains access to data, applications, or systems. Example: Eavesdropping on network traffic, Man-in-the-Middle (MitM) attack.