100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D430 fundamentals of information security latest update graded A+

Rating
-
Sold
-
Pages
42
Grade
A+
Uploaded on
10-04-2024
Written in
2023/2024

WGU D430 fundamentals of information security latest update graded A+ Information security protecting data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction. Compliance The requirements that are set forth by laws and industry regulations. IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal government agencies DAD Triad Disclosure, alteration, and denial CIA Triad The core model of all information security concepts. Confidential, integrity and availability Confidential Ability to protect our data from those who are not authorized to view it. What ways can confidentiality be compromised? - lose a personal laptop with data - Person can view your password you are entering in - Send an email attachment to the wrong person. - Attacker can penetrate your systems....etc. integrity Keeping data unaltered by accidental or malicious intent How to maintain integrity? Prevent unauthorized changes to the data and the ability to reverse unwanted authorized changes. Via system/file permissions or Undo/Roll back undesirable changes. Availability The ability to access data when needed Ways Availability can be compromised - Power loss - Application issues - Network attacks - System compromised (DoS) Denial of Service (DoS) Security problem in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity. Parkerian hexad model A model that adds three more principles to the CIA triad: Possession/Control Utility Authenticity Possession/ control Refers to the physical disposition of the media on which the data is stored; This allows you to discuss loss of data via its physical medium. Principle of Possession example Lost package (encrypted USB's and unencrypted USB's) possession is an issue because the tapes are physically lost. (Unencrypted is compromised via confidentiality and possession; encrypted is compromised only via possession). Principle of Authenticity Allows you to say whether you've attributed the data in question to the proper owner/creator. Ways authenticity can be compromised Sending an email but altering the message to look like it came from someone else, than the original one that was sent. Utility How useful the data is to you. Ex. Unencrypted (a lot of utility) Encrypted (little utility). Security Attacks Broken down from the type of attack, risk the attack represents, and controls you might use to mitigate it. Types of attacks

Show more Read less
Institution
WGU D430 Fundamentals Of Information Security
Course
WGU D430 fundamentals of information security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430 fundamentals of information security
Course
WGU D430 fundamentals of information security

Document information

Uploaded on
April 10, 2024
Number of pages
42
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1910
Member since
2 year
Number of followers
865
Documents
21100
Last sold
1 day ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

442 reviews

5
240
4
79
3
61
2
24
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions