Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D430 Fundamentals of Information Security – Course Summary and Exam-Ready Study Material

Beoordeling
-
Verkocht
-
Pagina's
35
Cijfer
A
Geüpload op
02-02-2025
Geschreven in
2024/2025

This document provides a clear overview of the major topics covered in WGU’s D430 Fundamentals of Information Security course, including core security principles, risk management, access control, network security, and incident response. It explains how these concepts apply to real-world cybersecurity environments and aligns with the competencies evaluated in the course assessments. Additional context helps reinforce exam-relevant terminology and foundational security practices.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU D430 fundamentals of information security



Information security - *answers * protecting data, software, and hardware secure against
unauthorized access, use, disclosure, disruption, modification, or destruction.



Compliance - *answers * The requirements that are set forth by laws and industry regulations.



IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal government
agencies



DAD Triad - *answers * Disclosure, alteration, and denial



CIA Triad - *answers * The core model of all information security concepts. Confidential,
integrity and availability



Confidential - *answers * Ability to protect our data from those who are not authorized to view
it.



What ways can confidentiality be compromised? - *answers * - lose a personal laptop with data

- Person can view your password you are entering in

- Send an email attachment to the wrong person.

- Attacker can penetrate your systems....etc.



integrity - *answers * Keeping data unaltered by accidental or malicious intent



How to maintain integrity? - *answers * Prevent unauthorized changes to the data and the
ability to reverse unwanted authorized changes.



Via system/file permissions or Undo/Roll back undesirable changes.

,WGU D430 fundamentals of information security




Availability - *answers * The ability to access data when needed



Ways Availability can be compromised - *answers * - Power loss

- Application issues

- Network attacks

- System compromised (DoS)



Denial of Service (DoS) - *answers * Security problem in which users are not able to access an
information system; can be caused by human errors, natural disaster, or malicious activity.



Parkerian hexad model - *answers * A model that adds three more principles to the CIA triad:



Possession/Control

Utility

Authenticity



Possession/ control - *answers * Refers to the physical disposition of the media on which the
data is stored; This allows you to discuss loss of data via its physical medium.



Principle of Possession example - *answers * Lost package (encrypted USB's and unencrypted
USB's)



possession is an issue because the tapes are physically lost.

,WGU D430 fundamentals of information security



(Unencrypted is compromised via confidentiality and possession; encrypted is compromised
only via possession).



Principle of Authenticity - *answers * Allows you to say whether you've attributed the data in
question to the proper owner/creator.



Ways authenticity can be compromised - *answers * Sending an email but altering the message
to look like it came from someone else, than the original one that was sent.



Utility - *answers * How useful the data is to you.



Ex. Unencrypted (a lot of utility) Encrypted (little utility).



Security Attacks - *answers * Broken down from the type of attack, risk the attack represents,
and controls you might use to mitigate it.



Types of attacks - *answers * 1- interception

2- interruption

3- modification

4- fabrication



Interception - *answers * Attacks allows unauthorized users to access our data, applications, or
environments.



Primarily an attack against confidentiality

, WGU D430 fundamentals of information security



Interception Attack Examples - *answers * Unauthorized file viewing, copying, eavesdropping
on phone conversations, reading someone's emails.



Interruption - *answers * Attacks cause our assets to become unstable or unavailable for our
use, on a temporary or permanent basis.



This attack affects availability but can also attack integrity



Interruption Attack Examples - *answers * DoS attack on a mail server; availability attack



Attacker manipulates the processes on which a database runs to prevent access; integrity
attack.



Could also be a combo of both.



Modification - *answers * Attacks involve tampering with our asset.



Such attacks might primarily be considered an integrity attack, but could also be an availability
attack.



Modification Attack example - *answers * Accessing a file in a unauthorized manner and alter
the data it contains; affects the integrity.



If the file in question is a config file that manages how a service behaves (web server) this may
affect the availability.

Geschreven voor

Vak

Documentinformatie

Geüpload op
2 februari 2025
Aantal pagina's
35
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
lizishiru

Maak kennis met de verkoper

Seller avatar
lizishiru University of Nairobi
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
0
Documenten
349
Laatst verkocht
-
High-Quality Summaries and Exam Prep

Welcome to my Stuvia profile! I provide high-quality, well-structured academic materials that are designed to support serious learners in achieving their academic goals. My resources include detailed notes, comprehensive summaries, exam preparations, and study guides that are clear, accurate, and aligned with course objectives. Each document is carefully written to ensure clarity, depth, and reliability—making it easier for you to grasp complex concepts, revise efficiently, and excel in your assessments. By choosing my materials, you can expect: ✅ Accurate and well-researched content ✅ Organized and easy-to-follow structure ✅ Reliable support for exams, assignments, and study sessions My goal is to help students save time, study effectively, and achieve outstanding results.

Lees meer Lees minder
0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen