Chp 1 Foundational Concepts in Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Q. What is Information Security?

Protection of an automated information system to maintain integrity, availability, and confidentiality of information system resources.

2
New cards

Q. What is Network Security?

Activities designed to protect the usability and integrity of a network and data, managing access and preventing threats from spreading.

3
New cards

Q. Which of the following is not part of network security?

  • managing access

  • Protecting usability

  • Printing documents

  • Stopping threats from spreading

Printing documents

4
New cards

Q. What does CIA stand for?

Confidentiality, Integrity, and Availability.

5
New cards

Q. Define Confidentiality.

Protection of information from unauthorized access or disclosure.

6
New cards

Q. Define Integrity.

Maintaining accuracy and consistency of information unless authorized changes are made.

7
New cards

Q. Define Availability.

Ensuring information is accessible when and where it’s needed.

8
New cards

Q. A system allowing unauthorized users to view data violates which CIA element?

Confidentiality

9
New cards

Q. A server crash that prevents data access affects what?

Availability

10
New cards

Q. Define Risk.

The potential for loss or damage when a threat exploits a vulnerability. (Risk = Threat × Vulnerability)

11
New cards

Q. Define Threat.

Anything that can exploit a vulnerability and cause harm (natural, unintentional, or intentional).

12
New cards

Q. Define Vulnerability.

A weakness in a system or device that can be exploited by attackers.

13
New cards

Q. Define Attack.

An intentional attempt to cause damage or gain unauthorized access.

14
New cards

Q. What are common attack vectors?

Network, User, Email, Web Application, Remote Access, Mobile.

15
New cards

Q. Types of Attacks?

Passive, Active, Insider, Outsider.

16
New cards

Q. Formula Risk?

Risk = Threat × Vulnerability

17
New cards

Q. Define Authentication.

The process of verifying identity (e.g., username & password).

18
New cards

Q. Define Authorization.

Granting permission to specific resources or actions.

19
New cards

Q. Define Access Control.

Policies that restrict access to information or locations.

20
New cards

Q. What does AAA stand for in security?

Authentication, Authorization, and Access Control

21
New cards

Q. Checking a user’s password is an example of:

Authentication

22
New cards

Q. Allowing access to only certain rooms represents:

Authorization

23
New cards