click below
click below
Normal Size Small Size show me how
CISSP
What are the objectives of the CIA triad | - Confidentiality - Integrity - Availability |
What is a way to evaluate vulnerabilities based on the CIA tenets? | Vulnerabilities and threads evaluated based on the numbers of CIA tenets that are affected by them |
On what the confidentiality principle consists of? | The assurance that - Data - Objects - Resources are restricted from unauthorized access |
How does confidentiality applies on a network? | Protecting data from unauthorized access, use or disclosure while stored, in process or in transit |
Provide examples of attacks that focus on violation of confidentiality | - capturing network traffic - stealing password files - social engineering - port scanning - shoulder surfing - eavesdropping - sniffing |