Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Define the confidentiality in the CIA triad

Beoordeling
-
Verkocht
-
Pagina's
56
Geüpload op
19-12-2024
Geschreven in
2024/2025

Define the confidentiality in the CIA triad

Instelling
Vak

Voorbeeld van de inhoud

Define the confidentiality in the CIA triad. -
answersOur ability to protect data from
those who are not authorized to view it.
Examples of confidentiality - answersA
patron using an ATM card wants to keep
their PIN number confidential.
An ATM owner wants to keep bank account
numbers confidential.
How can confidentiality be broken? -
answersLosing a laptop
An attacker gets access to info
A person can look over your shoulder
Define integrity in the CIA triad. -
answersThe ability to prevent people from
changing your data and the ability to
reverse unwanted changes.
How do you control integrity? -
answersPermissions restrict what users can
do (read, write, etc.)
Examples of integrity - answersData used
by a doctor to make medical decisions
needs to be correct or the patient can die.

,Define the availability in the CIA triad. -
answersOur data needs to be accessible
when we need it.
How can availability be broken? -
answersLoss of power, application
problems. If caused by an attacker, this is a
Denial of Service attack.
Define information security. - answersThe
protection of information and information
systems from unauthorized access, use,
disclosure, disruption, modification, or
destruction in order to provide
confidentiality, integrity, and availability.
Define the Parkerian Hexad and its
principles. - answersThe Parkerian Hexad
includes confidentiality, integrity, and
availability from the CIA triad. It also
includes possession (or control),
authenticity, and utility.
Authenticity - answersWhether the data in
question comes from who or where it says it
comes from (i.e. did this person actually
send this email?)

,Confidentiality is affected by what type of
attack? - answersInterception (eaves
dropping)
Integrity is affected by what type of attacks?
- answersInterruption (assets are
unusable), modification (tampering with an
asset), fabrication (generating false data)
Authenticity is affected by what type of
attacks? - answersInterruption (assets are
unusable), modification (tampering with an
asset), fabrication (generating false data)
Utility - answersHow useful the data is to
you (can be a spectrum, not just yes or no)
Possession - answersDo you physically
have the data in question? Used to
describe the scope of a loss
Identify the four types of attacks -
answersinterception, interruption,
modification, and fabrication
Interception attacks - answersMake your
assets unusable or unavailable

, Interruption attacks - answerscause assets
to become unusable or unavailable for our
use, on a temporary or permanent basis
Modification attacks - answersTampering
with an asset
Fabrication attacks - answersGenerating
data, process, and communications
Define the risk management process -
answers1. Identify assets
2. Identify threats
3. Assess vulnerabilities
4. Assess risks
5. Mitigate risks
Define the incident response process and
its stages. - answersPreparation
Detection and analysis
Containment
Eradication
Recovery
Preparation in incident response -
answerscreating policies and procedures

Geschreven voor

Vak

Documentinformatie

Geüpload op
19 december 2024
Aantal pagina's
56
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Onbekend

Onderwerpen

$13.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
TUTORKEN

Maak kennis met de verkoper

Seller avatar
TUTORKEN Walden University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
0
Documenten
43
Laatst verkocht
-
TUTOR KEN

You will get solutions to all subjects in both assignments and major exams. Contact me for any assisstance. Good luck! Simple well-researched education material for you. Expertise in Nursing, Mathematics, Psychology, Biology etc,. My Work contains the latest, updated Exam Solutions, Study Guides, Notes 100% verified Guarantee .

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen