CIA TRIAD, THREATS/VULNERABILITIES, AND CONTROLS

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

CIA Triad

The three core principles of information security: Confidentiality, Integrity, and Availability.

2
New cards

Confidentiality

The principle of keeping sensitive information inaccessible to unauthorized users.

3
New cards

Integrity

The principle of maintaining the accuracy and consistency of data over its lifecycle.

4
New cards

Availability

The principle ensuring that information and resources are accessible to authorized users when needed.

5
New cards

Encryption

The process of converting information into a code to prevent unauthorized access.

6
New cards

Access Control

The practice of limiting access to data and resources to authorized users only.

7
New cards

Hashing Algorithm

A function that converts an input into a fixed-length string of characters, used for data integrity verification.

8
New cards

SHA

Secure Hash Algorithm; a family of cryptographic hash functions designed for data integrity.

9
New cards

MD5

Message Digest 5; a widely used hashing algorithm that produces a 128-bit hash value.

10
New cards

Vulnerability

A flaw or weakness in a system that can be exploited by threats to gain unauthorized access.

11
New cards

Threat

Any circumstance or event that has the potential to cause harm to a system or organization.

12
New cards

Risk

The potential for loss or damage when a threat exploits a vulnerability.

13
New cards

Nonrepudiation

The assurance that someone cannot deny the validity of their signature or the sending of a message.

14
New cards

Authenticity

The property of being genuine or original, ensuring that data has not been altered by unauthorized entities.

15
New cards

Defense in Depth

A security approach that uses multiple layers of defense to protect information and resources.

16
New cards

Compensating Control

An alternative measure used to fulfill the requirement of a primary control that is unavailable.

17
New cards

Directive Control

Controls that provide guidance and policy direction for security efforts.

18
New cards

Zero Trust

A security model that assumes threats could be internal or external, requiring verification for every access attempt.

19
New cards

BeyondCorp

Google's implementation of the Zero Trust model, removing trust from the network perimeter.

20
New cards

Secure Zone

Segmentation of a network to create areas with specific access and security controls to protect data.

21
New cards

Micro Segmentation

Dividing the network into smaller, isolated segments to minimize the risk of lateral movement by attackers.

22
New cards

Monitoring Plan

The component that observes activity within the network to detect and respond to potential threats.

23
New cards

Policy Enforcement Point

The system component that enforces access control policies and decisions made by the control plan.

24
New cards

____ is the principle of keeping unauthorized users from accessing sensitive information.

Confidentiality

25
New cards

The assurance that someone cannot deny the validity of their signature is known as ____.

Nonrepudiation

26
New cards

A flaw in a system that can be exploited is termed a ____.

Vulnerability

27
New cards

The continuous movement of data in a secure manner is referred to as ____.

Data Integrity

28
New cards

____ refers to the process of translating information into an unreadable format to prevent unauthorized access.

Encryption

29
New cards

The principle ensuring that information is reliably accessible to authorized users is called ____.

Availability

30
New cards

A ____ control is an alternative measure used when a primary security control is not available.

Compensating

31
New cards

The principle focusing on keeping data accurate and consistent is known as ____.

Integrity

32
New cards

The practice of managing who can access specific data and resources is called ____ Control.

Access

33
New cards

In a security framework, ____ enforcement points are systems that uphold access control policies.

Policy

34
New cards

What does the CIA Triad represent in information security?

The CIA Triad represents Confidentiality, Integrity, and Availability, which are the three core principles of information security.

35
New cards

What is the purpose of encryption?

The purpose of encryption is to convert information into a code to prevent unauthorized access.

36
New cards

What does access control limit?

Access control limits access to data and resources to authorized users only.

37
New cards

How does hashing contribute to data integrity?

Hashing converts input data into a fixed-length string, allowing verification of data integrity.

38
New cards

What is the goal of using defense in depth?

The goal of defense in depth is to use multiple layers of security measures to protect information and resources.

39
New cards

What does the term 'risk' refer to in information security?

Risk refers to the potential for loss or damage when a threat exploits a vulnerability.

40
New cards

What is a vulnerability in the context of cybersecurity?

A vulnerability is a flaw or weakness in a system that can be exploited by threats.

41
New cards

Define nonrepudiation in information security.

Nonrepudiation is the assurance that someone cannot deny the validity of their signature or the sending of a message.

42
New cards

What is the significance of the Zero Trust model?

Zero Trust assumes that threats could be internal or external, requiring verification for every access attempt.

43
New cards

What does policy enforcement point do?

A policy enforcement point enforces access control policies and decisions made by the control plan.