Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY STUDY PREP

Beoordeling
-
Verkocht
-
Pagina's
23
Cijfer
A+
Geüpload op
29-01-2023
Geschreven in
2022/2023

WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY STUDY PREP/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY STUDY PREP/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY STUDY PREP

Instelling
Vak

Voorbeeld van de inhoud

WGU C836 - FUNDAMENTALS OF INFORMATION
SECURITY STUDY PREP
Information Security - ✔Protecting an organization's information and information
systems from unauthorized access, use, disclosure, disruption, modification, or
destruction.

Compliance - ✔Requirements that are set forth by laws and
industry regulations.

CIA - ✔Confidentiality, Integrity, Availability

Confidentiality - ✔Refers to our ability to protect our data from those who are not
authorized to use/view it

Integrity - ✔The ability to prevent people from changing your data in an unauthorized or
undesirable manner

Availability - ✔Refers to the ability to access our data when we need it

Possession/Control - ✔refers to the physical disposition of the media on which the data
is stored. (tape examples where some are encrypted and some are not)

Authenticity - ✔whether you've attributed the data in question to the proper owner or
creator. (altered email that says it's from one person when it's not - violation of the
authenticity of the email)

Utility - ✔refers to how useful the data is to you.

Attacks - ✔interception, interruption, modification, and
fabrication

Interception - ✔attacks that allow unauthorized users to access your data, applications,
or environments. Are primarily attacks against confidentiality

Interruption - ✔attacks that make your assets unusable or unavailable to you
temporarily or permanently. DoS attack on a mail server, for example. May also affect
integrity

Modification - ✔attacks involve tampering with our asset. Such attacks might primarily
be considered an integrity attack but could also represent an availability attack.

Fabrication - ✔attacks involve generating data, processes, communications, or other
similar activities with a system. Fabrication attacks primarily affect integrity but could be
considered an availability attack as well.

,WGU C836 - FUNDAMENTALS OF INFORMATION
SECURITY STUDY PREP
Risk - ✔is the likelihood that an event will occur. To have risk there must be a
threat and vulnerability.

Threats - ✔are any events being man-made, natural or environmental that could cause
damage to assets.

Vulnerabilities - ✔are a weakness that a threat event or the threat agent can take
advantage of.

Impact - ✔takes into account the value of the asset being threatened and uses it to
calculate risk

Risk Management Process - ✔Identify assets, identify threats, assess vulnerabilities,
assess risks, mitigate risks

Defense in Depth - ✔Using multiple layers of security to defend your assets.

Controls - ✔are the ways we protect assets. Three different types: physical, logical,
administrative

Physical Controls - ✔environment; physical items that protect assets think locks, doors,
guards, and, fences or environmental factors (time)

Logical Controls - ✔Sometimes called technical controls, these protect the systems,
networks, and environments that process, transmit, and store our data

Administrative Controls - ✔based on laws, rules, policies, and procedures, guidelines,
and other items that are "paper" in nature. They are the policies that organizations
create for governance. For example, acceptable use and email use policies.

Preparation - ✔phase of incident response consists of all of the activities that we can
perform, in advance of the incident itself, in order to better enable us to handle it.

Incident Response Process - ✔1. Preparation
2. Detection and Analysis (Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity: document/Lessons learned

Detection & Analysis - ✔where the action begins to happen in our incident response
process. In this phase, we will detect the occurrence of an issue and decide whether or
not it is actually an incident, so that we can respond appropriately to it.

, WGU C836 - FUNDAMENTALS OF INFORMATION
SECURITY STUDY PREP

Containment - ✔involves taking steps to ensure that the situation does not cause any
more damage than it already has, or to at least lessen any ongoing harm.

Eradication - ✔attempt to remove the effects of the issue from our environment.

Recovery - ✔restoring devices or data to pre-incident state (rebuilding systems,
reloading applications, backup media, etc.)

Post-incident activity - ✔determine specifically what happened, why it happened, and
what we can do to keep it from happening again. (postmortem).

Identity - ✔who or what we claim to be. Simply an assertion.

Authentication - ✔the act of providing who or what we claim to be. More technically, the
set of methods used to establish whether a claim is true

Verification - ✔simply verifies status of ID. For example, showing your driver's license at
a bar. "Half-step" between identity and authentication

Five Different Types of Authentication - ✔• Something you know:
Username/Password/Pin
• Something you have: ID badge/swipe card/OTP
• Something you are: Fingerprint/Iris/Retina scan
• Somewhere you are: Geolocation
• Something you do: Handwriting/typing/walking

Single-factor authentication - ✔only using one type of authentication

Dual-factor authentication - ✔using two different factors of authentication (2 of the same
factor does not count )

Multi-factor authentication - ✔Use of several (more than two) authentication techniques
together, such as passwords and security tokens, and geolocation.

Mutual Authentication - ✔process where the session is
authenticated on both ends and just one end.

Mutual authentication prevents what kind of attacks? - ✔man-in-the-middle attacks

Using a password for access is what kind of authentication - ✔Something you know

An iris-scan for access is what kind of authentication - ✔Something you are

Geschreven voor

Vak

Documentinformatie

Geüpload op
29 januari 2023
Aantal pagina's
23
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Ultimatenurse Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
288
Lid sinds
5 jaar
Aantal volgers
250
Documenten
2068
Laatst verkocht
6 maanden geleden
A+ GRADED STUDY MATERIALS

Here you will find all the Nursing & other professional study materials that are A graded. If you are not pleased with any of my study materials please message me and I will help you out in the best way I can.

3.7

42 beoordelingen

5
18
4
9
3
6
2
3
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen