INFORMATION SECURITY EXAM WITH
ALL ANSWERS
DefinehthehconfidentialityhinhthehCIAhtriad.h-hcorrecthanswer-
Ourhabilityhtohprotecthdatahfromhthosehwhoharehnothauthorizedhtohviewhit.
Exampleshofhconfidentialityh-hcorrecthanswer-
AhpatronhusinghanhATMhcardhwantshtohkeephtheirhPINhnumberhconfidential.h
AnhATMhownerhwantshtohkeephbankhaccounthnumbershconfidential.
Howhcanhconfidentialityhbehbroken?h-hcorrecthanswer-Losinghahlaptop
Anhattackerhgetshaccesshtohinfo
Ahpersonhcanhlookhoverhyourhshoulder
DefinehintegrityhinhthehCIAhtriad.h-hcorrecthanswer-
Thehabilityhtohpreventhpeoplehfromhchanginghyourhdatahandhthehabilityhtohreversehunwan
tedhchanges.
Howhdohyouhcontrolhintegrity?h-hcorrecthanswer-
Permissionshrestricthwhathusershcanhdoh(read,hwrite,hetc.)
Exampleshofhintegrityh-hcorrecthanswer-
Datahusedhbyhahdoctorhtohmakehmedicalhdecisionshneedshtohbehcorrecthorhthehpatienthca
nhdie.
DefinehthehavailabilityhinhthehCIAhtriad.h-hcorrecthanswer-
Ourhdatahneedshtohbehaccessiblehwhenhwehneedhit.
Howhcanhavailabilityhbehbroken?h-hcorrecthanswer-
Losshofhpower,happlicationhproblems.hIfhcausedhbyhanhattacker,hthishishahDenialhofhServi
cehattack.
Definehinformationhsecurity.h-hcorrecthanswer-
Thehprotectionhofhinformationhandhinformationhsystemshfromhunauthorizedhaccess,huse,
, disclosure,hdisruption,hmodification,horhdestructionhinhorderhtohprovidehconfidentiality,hi
h
ntegrity,handhavailability.
DefinehthehParkerianhHexadhandhitshprinciples.h-hcorrecthanswer-
ThehParkerianhHexadhincludeshconfidentiality,hintegrity,handhavailabilityhfromhthehCIAhtri
ad.hIthalsohincludeshpossessionh(orhcontrol),hauthenticity,handhutility.
Authenticityh-hcorrecthanswer-
Whetherhthehdatahinhquestionhcomeshfromhwhohorhwherehithsayshithcomeshfromh(i.e.hdidht
hishpersonhactuallyhsendhthishemail?)
Confidentialityhishaffectedhbyhwhathtypehofhattack?h-hcorrecthanswer-
Interceptionh(eaveshdropping)
Integrityhishaffectedhbyhwhathtypehofhattacks?h-hcorrecthanswer-
Interruptionh(assetsharehunusable),hmodificationh(tamperinghwithhanhasset),hfabricationh
(generatinghfalsehdata)
Authenticityhishaffectedhbyhwhathtypehofhattacks?h-hcorrecthanswer-
Interruptionh(assetsharehunusable),hmodificationh(tamperinghwithhanhasset),hfabricationh
(generatinghfalsehdata)
Utilityh-hcorrecthanswer-
Howhusefulhthehdatahishtohyouh(canhbehahspectrum,hnothjusthyeshorhno)
Possessionh-hcorrecthanswer-
Dohyouhphysicallyhhavehthehdatahinhquestion?hUsedhtohdescribehthehscopehofhahloss
Identifyhthehfourhtypeshofhattacksh-hcorrecthanswer-
interception,hinterruption,hmodification,handhfabrication
Interceptionhattacksh-hcorrecthanswer-Makehyourhassetshunusablehorhunavailable
Interruptionhattacksh-hcorrecthanswer-
causehassetshtohbecomehunusablehorhunavailablehforhourhuse,honhahtemporaryhorhperma
nenthbasis
Modificationhattacksh-hcorrecthanswer-Tamperinghwithhanhasset
Fabricationhattacksh-hcorrecthanswer-Generatinghdata,hprocess,handhcommunications
Definehthehriskhmanagementhprocessh-hcorrecthanswer-1.hIdentifyhassets
2.hIdentifyhthreats
3.hAssesshvulnerabilities
4.hAssesshrisks
5.hMitigatehrisks
Definehthehincidenthresponsehprocesshandhitshstages.h-hcorrecthanswer-Preparation
Detectionhandhanalysis
Containment