click below
click below
Normal Size Small Size show me how
CYB1UofI_FISCH1.6
Summary
| Question | Answer |
|---|---|
| what is helpful to have when discussing issues pertaining to information security, such as attacks and controls | model |
| what are the two potential models | CIA triad and the Parkerian Hexad |
| what is the CIA triad composed of | confidentiality, integrity and availability |
| what is the Parkerian Hexad composed of | confidentiality, integrity, availability, possession or control, authenticity and utility |
| what is helpful to understand when looking toward preventing attacks | the general categories of damage that you might see occur in the event of an attack |
| how can attacks impact enviorments | through interception, interruption, modification or fabrication |
| each of the effects (environmental impact through interception, interruption, modification or fabrication) impact __ | particular areas of the CIA triad |
| what is important to understand when discussing specific threats you might face | the concept of risk |
| when do you face risk | you only face risk from an attack when a threat is present and you have vulnerability that threat can exploit |
| what can you use to mitigate risk | three types of controls: physical, logical, and administrative |
| what is particularly important concept in the world of information security | defense in depth |
| how do you build defensive measurers using defense in depth (concept) | you put multiple layers of defense to delay an attacker long enough to alert you to the attack and to allow you to mount a more active defense |
| what is foundational to information security | defining information security, determining when your secure, models for discussing security issues, attacks, defense in depth |
| what is used on a regular basis during normal information security tasks in many organizations | defining information security, determining when your secure, models for discussing security issues, attacks, defense in depth Example: someone talking about breaches of confidentiality or authenticity of a given email message |
| what is a daily concern for organizations of any size | information security |
| what types of organizations is information security a daily concern | particularly those that handle any type of personal information, financial data, healthcare data, educational data, or other types of information regulated by the laws of the country in whihc the organization operates |
| what happens when an organization doesn't invest in information security | the repercussions can be severe - they might face fines, lawsuits or even the inability to continue conducting business if they lose control of critical or sensitive data |
| what is a key component to the modern business world | information security |