1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
security incidents
somethings that occurs when the CIA triad is breached purposley or accidental
DAD triad
model that explains 3 main threats to cybersecurity
disclosure
part of the DAD triad that violates confidentiality by exposing data to unauthorized parties.
data exflriatoin
An attack where a hacker removes information from a system.
disclosure
an administrator accidentally misconfigures access controls is an example of what section of the DAD triad?
disclosure
a data exfiltration attack removes data from a system. What part of the DAD triad is this an example of
alteration
part of the DAD triad that violates integrity through the unauthoirzed modification of data.
alteration
An attacker modifies a database by adding fraudulent transactions to an account. What section of the DAD triad is occurring here?
alteration
a natural disaster causs a bit flip that modifies data in a system. What part of the DAD triad is occuring here?
alteration
a user accidentally modifies data in a system because of a typo. What part of the DAD triad is occuring here?
denial
part of the DAD triad where availability is breached when authorized users a unable to access resources.
denial
An attacker carries out a DOS against a website. What part of the DAD triad is occuring here?
denial
failure of a critical server denies users availability to resources. What part of the DAD triad is occuring here?
financial
risk is where an organization loses money
financial
what risk is associate to the costs of rebuilding a datacenter after it’s destroyed?
financial
what risk is associated with the costs of hiring a professional to manage a security incident?
financial
an employee loses a laptop with information on a product that’s about to hit the market. The laptop costs a few thousand dollars, and they risk the product falling into the hands of a competitor. What risk is associated with this situation?
reputational
risk occuring when an organization’s image is damaged because a breach.
identity theft
What crime occurs when an attacker gains access to an individual's PII stored in an organization they’re a stakeholder of?
strategic
risk where an organization will have difficiulties meeting its goals because of a breach
strategic
An employee loses a laptop with plans for a product being developed. The organization risks setbacks because they don’t have a backup of the plans and risk it falling into the hands of a competitor. What risk is at play here?
operational
risk that delays an organization’s daily operations
compliance
risk where a breach causes an organization to break regulations.
compliance
A breach causes them to lose PHI, resulting in fines and sanctions due to HIPAA violations. What risk is associated with this scenario?