Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Fundamentals of Information Security: CIA Triad, Parkerian Hexad, and Risk Management, Exams of Organization and Business Administration

A comprehensive overview of fundamental information security concepts, including the cia triad (confidentiality, integrity, availability), the parkerian hexad, and risk management principles. It explores various security threats, attack types, and mitigation strategies, emphasizing the importance of protecting data at rest, in motion, and in use. The document also delves into regulatory compliance, privacy guidelines, and cryptography techniques, offering a foundational understanding of information security practices.

Typology: Exams

2024/2025

Available from 04/04/2025

edda-wanje
edda-wanje 🇺🇸

130 documents

1 / 10

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY WITH
VERIFIED ANSWERS 100% CORRECT
2025/2026
DEFINE THE CONFIDENTIALITY IN THE CIA TRIAD.
OUR ABILITY TO PROTECT DATA FROM THOSE WHO ARE NOT AUTHORIZED TO VIEW IT.
EXAMPLES OF CONFIDENTIALITY
A PATRON USING AN ATM CARD WANTS TO KEEP THEIR PIN NUMBER CONFIDENTIAL.
AN ATM OWNER WANTS TO KEEP BANK ACCOUNT NUMBERS CONFIDENTIAL.
HOW CAN CONFIDENTIALITY BE BROKEN?
LOSING A LAPTOP
AN ATTACKER GETS ACCESS TO INFO
A PERSON CAN LOOK OVER YOUR SHOULDER
DEFINE INTEGRITY IN THE CIA TRIAD.
THE ABILITY TO PREVENT PEOPLE FROM CHANGING YOUR DATA AND THE ABILITY TO REVERSE
UNWANTED CHANGES.
HOW DO YOU CONTROL INTEGRITY?
PERMISSIONS RESTRICT WHAT USERS CAN DO (READ, WRITE, ETC.)
EXAMPLES OF INTEGRITY
DATA USED BY A DOCTOR TO MAKE MEDICAL DECISIONS NEEDS TO BE CORRECT OR THE
PATIENT CAN DIE.
DEFINE THE AVAILABILITY IN THE CIA TRIAD.
OUR DATA NEEDS TO BE ACCESSIBLE WHEN WE NEED IT.
HOW CAN AVAILABILITY BE BROKEN?
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download Fundamentals of Information Security: CIA Triad, Parkerian Hexad, and Risk Management and more Exams Organization and Business Administration in PDF only on Docsity!

WGU D430 FUNDAMENTALS OF

INFORMATION SECURITY WITH

VERIFIED ANSWERS 100% CORRECT

DEFINE THE CONFIDENTIALITY IN THE CIA TRIAD.

OUR ABILITY TO PROTECT DATA FROM THOSE WHO ARE NOT AUTHORIZED TO VIEW IT.

EXAMPLES OF CONFIDENTIALITY

A PATRON USING AN ATM CARD WANTS TO KEEP THEIR PIN NUMBER CONFIDENTIAL.

AN ATM OWNER WANTS TO KEEP BANK ACCOUNT NUMBERS CONFIDENTIAL.

HOW CAN CONFIDENTIALITY BE BROKEN?

LOSING A LAPTOP

AN ATTACKER GETS ACCESS TO INFO

A PERSON CAN LOOK OVER YOUR SHOULDER

DEFINE INTEGRITY IN THE CIA TRIAD.

THE ABILITY TO PREVENT PEOPLE FROM CHANGING YOUR DATA AND THE ABILITY TO REVERSE

UNWANTED CHANGES.

HOW DO YOU CONTROL INTEGRITY?

PERMISSIONS RESTRICT WHAT USERS CAN DO (READ, WRITE, ETC.)

EXAMPLES OF INTEGRITY

DATA USED BY A DOCTOR TO MAKE MEDICAL DECISIONS NEEDS TO BE CORRECT OR THE

PATIENT CAN DIE.

DEFINE THE AVAILABILITY IN THE CIA TRIAD.

OUR DATA NEEDS TO BE ACCESSIBLE WHEN WE NEED IT.

HOW CAN AVAILABILITY BE BROKEN?

LOSS OF POWER, APPLICATION PROBLEMS. IF CAUSED BY AN ATTACKER, THIS IS A DENIAL OF

SERVICE ATTACK.

DEFINE INFORMATION SECURITY.

THE PROTECTION OF INFORMATION AND INFORMATION SYSTEMS FROM UNAUTHORIZED

ACCESS, USE, DISCLOSURE, DISRUPTION, MODIFICATION, OR DESTRUCTION IN ORDER TO

PROVIDE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY.

DEFINE THE PARKERIAN HEXAD AND ITS PRINCIPLES.

THE PARKERIAN HEXAD INCLUDES CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY FROM THE

CIA TRIAD. IT ALSO INCLUDES POSSESSION (OR CONTROL), AUTHENTICITY, AND UTILITY.

AUTHENTICITY

WHETHER THE DATA IN QUESTION COMES FROM WHO OR WHERE IT SAYS IT COMES FROM (I.E.

DID THIS PERSON ACTUALLY SEND THIS EMAIL?)

CONFIDENTIALITY IS AFFECTED BY WHAT TYPE OF ATTACK?

INTERCEPTION (EAVES DROPPING)

INTEGRITY IS AFFECTED BY WHAT TYPE OF ATTACKS?

INTERRUPTION (ASSETS ARE UNUSABLE), MODIFICATION (TAMPERING WITH AN ASSET),

FABRICATION (GENERATING FALSE DATA)

AUTHENTICITY IS AFFECTED BY WHAT TYPE OF ATTACKS?

INTERRUPTION (ASSETS ARE UNUSABLE), MODIFICATION (TAMPERING WITH AN ASSET),

FABRICATION (GENERATING FALSE DATA)

UTILITY

HOW USEFUL THE DATA IS TO YOU (CAN BE A SPECTRUM, NOT JUST YES OR NO)

POSSESSION

DO YOU PHYSICALLY HAVE THE DATA IN QUESTION? USED TO DESCRIBE THE SCOPE OF A LOSS

IDENTIFY THE FOUR TYPES OF ATTACKS

INTERCEPTION, INTERRUPTION, MODIFICATION, AND FABRICATION

INTERCEPTION ATTACKS

MAKE YOUR ASSETS UNUSABLE OR UNAVAILABLE

DEVELOPMENT OF ROBUST POLICIES

IDENTIFICATION OF EMERGENT RECENT

IDENTIFY ELEMENTS OF INTERNAL WEAKNESS

IDENTIFY THE LAYERS OF A DEFENSE-IN-DEPTH STRATEGY.

EXTERNAL NETWORK

INTERNAL NETWORK

HOST

APPLICATION

DATA

DEFINE IDENTIFICATION

THE CLAIM OF WHO WE/NETWORKS ARE

DEFINE IDENTITY VERIFICATION.

SOMEONE CLAIMS WHO THEY ARE AND YOU TAKE IT ONE STEP FATHER AND ASK FOR ID

DEFINE AUTHENTICATION

A SET OF METHODS USED TO DETERMINE IF A CLAIM OF IDENTITY IS TRUE.

COMPARE AUTHENTICATION TYPES.

MULTIFACTOR AUTHENTICATION

MUTUAL AUTHENTICATION

IDENTIFY PASSWORD SECURITY BEST PRACTICES.

UPPER CASE

LOWER CASE

NUMBERS

SYMBOLS

IDENTIFY THE FACTORS INVOLVED IN A MULTIFACTOR AUTHENTICATION TECHNIQUE.

SOMETHING YOU DO

SOMETHING YOU HAVE

WHERE YOU ARE

DEFINE ACCOUNTABILITY AND ITS BENEFITS

NONREPUDIATION, DETERRENCE, INTRUSION DETECTION AND PREVENTION, AND

ADMISSIBILITY OF RECORDS

AUDITING

HOLD USERS OF YOUR SYSTEM ACCOUNTABLE. A METHODICAL EXAMINATION AND REVIEW OF

AN ORGANIZATION'S RECORDS.

NONREPUDIATION MEASURES

MAKE IT SO THAT SOMEONE CAN'T SEND AN EMAIL AND THEN DENY SENDING IT. USUALLY

WITH A DIGITAL SIGNATURE.

WHICH STANDARDS APPLY TO ANY FINANCIAL ENTITY POLICIES?

GRAMM-LEECH-BLILEY

WHICH STANDARDS APPLY TO PUBLICLY TRADED COMPANIES DOING BUSINESS IN THE U.S?

SARBANES-OXLEY ACT (SOX)

WHICH STANDARDS APPLY TO CREDIT CARD INDUSTRY?

PCI DSS

WHICH CHARACTERISTIC FALLS UNDER ACCOUNTABILITY?

IDENTITY

WHAT COMPANY AUDITS OTHER COMPANIES FOR LICENSING REQUIREMENTS?

BSA

DEFINE CRYPTOGRAPHY, INCLUDING ITS ORIGINS AND INFLUENCERS.

THE SCIENCE OF PROTECTING THE CONFIDENTIALITY AND INTEGRITY OF DATA

SYMMETRIC KEY CRYPTOGRAPHY

THE SENDER AND RECEIVER USE THE SAME KEY FOR ENCRYPTION AND DECRYPTION

ASYMMETRIC KEY CRYPTOGRAPHY

ENCRYPTION THAT USES TWO SEPARATE KEYS- A PUBLIC KEY AND A PRIVATE KEY. ADVANTAGE IS

THAT YOU CAN POST THE PUBLIC KEY AND ANYONE CAN SEND YOU AN ENCRYPTED MESSAGE.

HASH FUNCTIONS

MATHEMATICAL ALGORITHMS THAT GENERATE A MESSAGE SUMMARY OR DIGEST (SOMETIMES

CALLED A FINGERPRINT) TO CONFIRM MESSAGE IDENTITY AND INTEGRITY

DIGITAL SIGNATURE

COMPANIES. INCLUDED WITHIN GLBA ARE MULTIPLE SECTIONS RELATING TO THE PRIVACY OF

FINANCIAL INFORMATION. COMPANIES MUST PROVIDE WRITTEN NOTICE TO CONSUMERS OF

THEIR PRIVACY RIGHTS AND EXPLAIN THE COMPANY'S PROCEDURES FOR SAFEGUARDING DATA.

PRIVACY GUIDELINES

GUIDELINES TO FOLLOW TO PROTECT PRIVATE INFORMATION OF PATIENTS

FISMA

FEDERAL INFO SECURITY MANAGEMENT ACT - US LAW REQUIRES FEDERAL AGENCIES TO

CREATE, DOCUMENT AND IMPLEMENT SECURITY PROGRAM

HIPPA

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT. PROTECTS PATIENT PRIVACY.

FERPA

FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT

SOX

SARBANES-OXLEY ACT. THIS LAW REQUIRES PUBLICLY TRADED COMPANIES AND THEIR

INDEPENDENT AUDITORS TO DEMONSTRATE THAT THEIR NUMBERS ARE ACCURATE AND THAT

THEY HAVE PROCESSES IN PLACE TO ENSURE ACCURATE REPORTING. SEVERAL SECTIONS OF THE

LAW HAVE IMPORTANT IMPLICATIONS FOR HUMAN RESOURCE ACTIVITIES.

INDUSTRY COMPLIANCE VS. REGULATORY COMPLIANCE

INDUSTRY COMPLIANCE ISN'T ENFORCED BY THE GOVERNMENT, LIKE REGULATORY

COMPLIANCE. IT'S A GROUP OF STAKEHOLDERS IN THE INDUSTRY THAT GET TOGETHER AND

DECIDE WHAT COMPLIANCE LOOKS LIKE.

COPPA

CHILDREN'S ONLINE PRIVACY PROTECTION ACT

ECC

ASYMMETRIC KEY ALGORITHM, PROVIDES ENCRYPTION, DIGITAL SIGNATURES, KEY EXCHANGE,

BASED ON THE IDEA OF USING POINTS ON A CURVE TO DEFINE THE PUBLIC/PRIVATE KEY, USED

IN WIRELESS DEVICES AND SMART CARDS

RSA

ASYMMETRIC ALGORITHM

SHA

HASHING ALGORITHM

DES

BLOCK CIPHER SYMMETRIC ALGORITHM

MD

MESSAGE DIGEST 5. A HASHING FUNCTION USED TO PROVIDE INTEGRITY.

PGP

PRETTY GOOD PRIVACY. COMMONLY USED TO SECURE E-MAIL COMMUNICATIONS BETWEEN

TWO PRIVATE INDIVIDUALS BUT IS ALSO USED IN COMPANIES. IT PROVIDES CONFIDENTIALITY,

INTEGRITY, AUTHENTICATION, AND NON-REPUDIATION. IT CAN DIGITALLY SIGN AND ENCRYPT E-

MAIL. IT USES BOTH ASYMMETRIC AND SYMMETRIC ENCRYPTION.

OPERATIONS SECURITY PROCESS

1. IDENTIFICATION OF CRITICAL INFORMATION

2. ANALYSIS OF THREATS

3. ANALYSIS OF VULNERABILITIES

4. ASSESSMENT OF RISKS

5. APPLICATION OF COUNTERMEASURES

OPERATIONS SECURITY

A SECURITY AND RISK MANAGEMENT PROCESS THAT PREVENTS SENSITIVE INFORMATION

FROM GETTING IN THE WRONG HANDS.

COMPETITIVE INTELLIGENCE

THE PROCESS OF GATHERING AND ANALYZING INFORMATION TO SUPPORT BUSINESS

DECISIONS

HAASE'S LAWS: KNOW THE THREATS

IF YOU DON'T KNOW THE THREAT, HOW DO YOU KNOW WHAT TO PROTECT? KNOW THE

THREATS FOR YOUR DATA BASED ON YOUR LOCATION.

HAASE'S LAWS: KNOW WHAT TO PROTECT

IF YOU DON'T KNOW WHAT TO PROTECT, HOW DO YOU KNOW YOU'RE PROTECTING IT? SOME

ORGS CLASSIFY INFORMATION (TOP SECRET).

PORT 80

PROVIDES HYPERTEXT TRANSFER PROTOCOL (HTTP) SERVICES, WHICH SERVES WEB CONTENT.

AES

AES IS THE STANDARD ENCRYPTION ALGORITHM USED BY THE US FEDERAL GOVERNMENT.

SSRF

(SERVER-SIDE REQUEST FORGERY) AN ATTACK THAT TAKES ADVANTAGE OF A TRUSTING

RELATIONSHIP BETWEEN WEB SERVERS. ATTACKER FINDS VULNERABLE WEB APPLICATION,

SENDS REQUEST TO WEB SERVER, WEB SERVER PERFORMS REQUEST ON BEHALF OF ATTACKER.

KISMET

KISMET IS A TOOL COMMONLY USED TO DETECT WIRELESS ACCESS POINTS.

HPING

A TOOL USED TO TEST THE SECURITY OF FIREWALLS AND MAP NETWORK TOPOLOGY.

- CONSTRUCTS SPECIALLY CRAFTED ICMP PACKETS TO EVADE MEASURES TO HIDE DEVICES

BEHIND FIREWALL

- SCRIPTING FUNCTIONALITY TO TEST FIREWALL/IDS

BURP SUITE

BURP SUITE IS A WEB ASSESSMENT AND ANALYSIS TOOL THAT LOOKS FOR ISSUES ON WEBSITES

SUCH AS CROSS-SITE SCRIPTING OR SQL INJECTION FLAWS.

FUZZER

A TYPE OF TOOL THAT WORKS BY BOMBARDING OUR APPLICATIONS WITH ALL MANNER OF

DATA AND INPUTS FROM A WIDE VARIETY OF SOURCES, IN THE HOPE THAT WE CAN CAUSE THE

APPLICATION TO FAIL OR TO PERFORM IN UNEXPECTED WAYS