100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

C836 - Fundamentals of Information Security (WGU)|latest update study guide

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
25-11-2024
Written in
2024/2025

C836 - Fundamentals of Information Security (WGU)|latest update study guide

Institution
C836 - Fundamentals Of Information Security
Course
C836 - Fundamentals of Information Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836 - Fundamentals of Information Security
Course
C836 - Fundamentals of Information Security

Document information

Uploaded on
November 25, 2024
Number of pages
32
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

C836 - Fundamentals of Information
Security (WGU)|latest update study
guide



Information Security - ANSWER >>>>>Protecting an organization's
information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.

Compliance - ANSWER >>>>>Requirements that are set forth by laws
and industry regulations.

CIA - ANSWER >>>>>Confidentiality, Integrity, Availability

Confidentiality - ANSWER >>>>>Refers to our ability to protect our data
from those who are not authorized to use/view it

Integrity - ANSWER >>>>>The ability to prevent people from changing
your data in an unauthorized or undesirable manner

Availability - ANSWER >>>>>Refers to the ability to access our data
when we need it

Utility - ANSWER >>>>>refers to how useful the data is to you.

Attacks - ANSWER >>>>>interception, interruption, modification, and
fabrication

Interception - ANSWER >>>>>attacks that allow unauthorized users to
access your data, applications, or environments. Are primarily attacks
against confidentiality

,Interruption - ANSWER >>>>>attacks that make your assets unusable or
unavailable to you temporarily or permanently. DoS attack on a mail
server, for example. May also affect integrity

Modification - ANSWER >>>>>attacks involve tampering with our asset.
Such attacks might primarily be considered an integrity attack but could
also represent an availability attack.

Fabrication - ANSWER >>>>>attacks involve generating data, processes,
communications, or other similar activities with a system. Fabrication
attacks primarily affect integrity but could be considered an availability
attack as well.

Risk - ANSWER >>>>>is the likelihood that an event will occur. To have
risk there must be a threat and vulnerability.

Risk Management Process - ANSWER >>>>>Identify assets, identify
threats, assess vulnerabilities, assess risks, mitigate risks

Defense in Depth - ANSWER >>>>>Using multiple layers of security to
defend your assets.

Controls - ANSWER >>>>>are the ways we protect assets. Three
different types: physical, logical, administrative

Physical Controls - ANSWER >>>>>environment; physical items that
protect assets think locks, doors, guards, and, fences or environmental
factors (time)

Logical Controls - ANSWER >>>>>Sometimes called technical controls,
these protect the systems, networks, and environments that process,
transmit, and store our data

Administrative Controls - ANSWER >>>>>based on laws, rules, policies,
and procedures, guidelines, and other items that are "paper" in nature.

,They are the policies that organizations create for governance. For
example, acceptable use and email use policies.

Preparation - ANSWER >>>>>phase of incident response consists of all
of the activities that we can perform, in advance of the incident itself, in
order to better enable us to handle it.

Incident Response Process - ANSWER >>>>>1. Preparation
2. Detection and Analysis (Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity: document/Lessons learned

Detection & Analysis - ANSWER >>>>>where the action begins to
happen in our incident response process. In this phase, we will detect
the occurrence of an issue and decide whether or not it is actually an
incident, so that we can respond appropriately to it.

Containment - ANSWER >>>>>involves taking steps to ensure that the
situation does not cause any more damage than it already has, or to at
least lessen any ongoing harm.

Post-incident activity - ANSWER >>>>>determine specifically what
happened, why it happened, and what we can do to keep it from
happening again. (postmortem).

Identity - ANSWER >>>>>who or what we claim to be. Simply an
assertion.

Authentication - ANSWER >>>>>the act of providing who or what we
claim to be. More technically, the set of methods used to establish
whether a claim is true

, Verification - ANSWER >>>>>simply verifies status of ID. For example,
showing your driver's license at a bar. "Half-step" between identity and
authentication

Five Different Types of Authentication - ANSWER >>>>>• Something
you know: Username/Password/Pin
• Something you have: ID badge/swipe card/OTP
• Something you are: Fingerprint/Iris/Retina scan
• Somewhere you are: Geolocation
• Something you do: Handwriting/typing/walking

Single-factor authentication - ANSWER >>>>>only using one type of
authentication

Dual-factor authentication - ANSWER >>>>>using two different factors
of authentication (2 of the same factor does not count )

Multi-factor authentication - ANSWER >>>>>Use of several (more than
two) authentication techniques together, such as passwords and
security tokens, and geolocation.

Mutual Authentication - ANSWER >>>>>process where the session is
authenticated on both ends and just one end.

Mutual authentication prevents what kind of attacks? - ANSWER
>>>>>man-in-the-middle attacks

Using a password for access is what kind of authentication - ANSWER
>>>>>Something you know

An iris-scan for access is what kind of authentication - ANSWER
>>>>>Something you are

Using a security key-fob for access is what kind of authentication -
ANSWER >>>>>Something you have

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MREXAMS Howard university
View profile
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
1 year
Number of followers
1
Documents
602
Last sold
3 days ago

4.0

2 reviews

5
1
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions