1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What does the CIA Triad stand for in cybersecurity?
Confidentiality, Integrity, and Availability
What principle ensures sensitive information is only accessible to authorized users?
Confidentiality
Name a key technique used to ensure confidentiality of data.
Encryption
What is the role of hashing in data integrity?
Hashing creates a unique identifier for data, making unauthorized modifications detectable.
What principle focuses on maintaining the accuracy and consistency of data?
Integrity
What are access controls used for in cybersecurity?
They limit access to data based on user roles, ensuring only authorized personnel can access sensitive information.
What ensures that data is accessible when needed without disruptions?
Availability
Name a technique used to enhance availability in systems.
Redundancy, like using backup systems or RAID arrays.
Which act mandates confidentiality measures in the healthcare sector?
Health Insurance Portability and Accountability Act (HIPAA)
What does the Bell-LaPadula model focus on?
The principle of confidentiality.
In risk management, what are the two primary methods used for conducting risk assessments?
Qualitative and Quantitative risk assessments.
What role does encryption play in data security?
It protects sensitive information by transforming it into an unreadable format.
Why is change management important in cybersecurity?
It minimizes risks associated with changes to the IT environment.
What does a layered security approach entail?
Implementing multiple layers of security controls to protect systems and data.
What is the purpose of threat modeling in cybersecurity?
To simulate potential attack scenarios to identify vulnerabilities.