1/26
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
cybersecurity
measures and controls that protect the computer CIA triad
CIA triad
confidentiality, availability, integrity
confidentiality
proper authorized access to information
availability
proper access to information
integrity
protection against improper modification
A student leaking grades from Canvas databases is a threat to ___
confidentiality
The shutdown of the reporting feature of a video game is a threat to ___
availability
Nonrepudiation, the inability to track modifications, is a threat to ____
integrity
The NPD breach which leaked a variety of personal information is an example of a ____ impact breach
high
In a survey of 100 users, 10 reported that they could not access the accessibility settings of an app. This is an example of a ___ impact breach
low
A temporary shutdown of a server for all users is an example of ____ impact breach
medium
Why does management proficiency conflict with cybersecurity
fallible individuals in charge with personal information
requires constant monitoring
implementation (eg. 2 factor authentication) considered a nuisance among user base
implemented as an afterthought
What makes cybersecurity difficult to implement, even when funded and approved
must understand creative attacker mindsets
must tactically place countermeasures effectively (eg. firewalls)
adversary/threat agent
any entity that threatens to breach the CIA triad
T/F - North Korea could be considered an adversary
True
Nations and governments with attack resources can undermine the CIA triad
Differentiate a threat and an attack
threats describe possible events that undermine the CIA triad
attacks are threats that are carried out
risk
probability of a threat + severity of threat
Differentiate countermeasures from security policies
countermeasures block attacks
security policies defines and restrict user activity to maintain the CIA triad
A firewall is an example of a ____
countermeasure
Two-factor authentication is an example of a ____
security policy
vulnerability
weaknesses in a system that can be exploited
system resource/asset
component essential to a system’s operation
T/F - A school’s IT department is an example of a system resource
True
Human resources may be considered assets
What is the relationship between countermeasures and risk
As countermeasures increase, risk decreases
UT abbreviation
User target
IBS abbreviation
infrastructure
CC abbreviation
communication channel