100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

Rating
5.0
(1)
Sold
-
Pages
20
Grade
A+
Uploaded on
06-08-2024
Written in
2024/2025

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

Institution
WGU D430
Course
WGU D430










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430
Course
WGU D430

Document information

Uploaded on
August 6, 2024
Number of pages
20
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY




1. Information security: protecting data, software, and hardware secure against
unauthorized access, use, disclosure, disruption, modification, or destruction.
2. Compliance: The requirements that are set forth by laws and industry regula-
tions.

IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal
government agencies
3. DAD Triad: Disclosure, alteration, and denial
4. CIA Triad: The core model of all information security concepts. Confidential,
integrity and availability
5. Confidential: Ability to protect our data from those who are not authorized to view
it.
6. What ways can confidentiality be compromised?: - lose a personal laptop with
data
- Person can view your password you are entering in
- Send an email attachment to the wrong person.
- Attacker can penetrate your systems ... etc.
7. integrity: Keeping data unaltered by accidental or malicious intent
8. How to maintain integrity?: Prevent unauthorized changes to the data and the
ability to reverse unwanted authorized changes.

Via system/file permissions or Undo/Roll back undesirable changes.
9. Availability: The ability to access data when needed
10. Ways Availability can be compromised: - Power loss
- Application issues
- Network attacks
- System compromised (DoS)
11. Denial of Service (DoS): Security problem in which users are not able to access
an information system; can be caused by human errors, natural disaster, or malicious
activity.
12. Parkerian hexad model: A model that adds three more principles to the CIA
triad:



, WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY
Possession/Control
Utility
Authenticity
13. Possession/ control: Refers to the physical disposition of the media on which
the data is stored; This allows you to discuss loss of data via its physical medium.






, WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY
14. Principle of Possession example: Lost package (encrypted USB's and unen-
crypted USB's)

possession is an issue because the tapes are physically lost.

(Unencrypted is compromised via confidentiality and possession; encrypted is com-
promised only via possession).
15. Principle of Authenticity: Allows you to say whether you've attributed the data
in question to the proper owner/creator.
16. Ways authenticity can be compromised: Sending an email but altering the
message to look like it came from someone else, than the original one that was
sent.
17. Utility: How useful the data is to you.

Ex. Unencrypted (a lot of utility) Encrypted (little utility).
18. Security Attacks: Broken down from the type of attack, risk the attack repre-
sents, and controls you might use to mitigate it.
19. Types of attacks: 1- interception
2- interruption
3- modification
4- fabrication
20. Interception: Attacks allows unauthorized users to access our data, applica-
tions, or environments.

Primarily an attack against confidentiality
21. Interception Attack Examples: Unauthorized file viewing, copying, eavesdrop-
ping on phone conversations, reading someone's emails.
22. Interruption: Attacks cause our assets to become unstable or unavailable for
our use, on a temporary or permanent basis.

This attack affects availability but can also attack integrity
23. Interruption Attack Examples: DoS attack on a mail server; availability attack

Attacker manipulates the processes on which a database runs to prevent access;
integrity attack.

Could also be a combo of both.
24. Modification: Attacks involve tampering with our asset.

Reviews from verified buyers

Showing all reviews
6 months ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Edufiles Howard County Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
100
Member since
1 year
Number of followers
11
Documents
6341
Last sold
2 days ago
EDUFILES STORES

Unlock success with our trusted collection of high-quality exam documents, study guides, and past papers from top universities. Whether you're preparing for midterms, finals, certifications, or professional exams, our expertly curated materials help you study smarter, score higher, and achieve your academic goals faster. Updated regularly and available instantly, our resources are designed to give you the edge you need.

4.9

208 reviews

5
199
4
2
3
1
2
1
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions