Scheduled maintenance: May 17, 2025 from 07:00 AM to 10:00 AM
C836 - Fundamentals of Information Security
(WGU)/WGU C836 - FUNDAMENTALS OF
INFORMATION SECURITY LATEST EXAM 2023-
2024 QUESTIONS AND ANSWERS
Save
Terms in this set (186)
Protecting an organization's information and
Information Security information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.
Requirements that are set forth by laws and
Compliance
industry regulations.
CIA Confidentiality, Integrity, Availability
Refers to our ability to protect our data from those
Confidentiality
who are not authorized to use/view it
The ability to prevent people from changing your data
Integrity
in an unauthorized or undesirable manner
Refers to the ability to access our data when we need
Availability
it
refers to the physical disposition of the media on
Possession/Control which the data is stored. (tape examples where some
are encrypted and some are not)
https://quizlet.com/1044334422/c836-fundamentals-of-information-security-wguwgu-c836-fundamentals-of-information-security-latest-exam-2023-202… 1/13
, 5/15/25, 12:06 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EX…
whether you've attributed the data in question to the
proper owner or creator. (altered email that says it's
Authenticity
from one person when it's not - violation of the
authenticity of the email)
Utility refers to how useful the data is to you.
interception, interruption, modification, and
Attacks
fabrication
attacks that allow unauthorized users to access your
Interception data, applications, or environments. Are primarily
attacks against confidentiality
attacks that make your assets unusable or unavailable
Interruption to you temporarily or permanently. DoS attack on a
mail server, for example. May also affect integrity
attacks involve tampering with our asset. Such attacks
Modification might primarily be considered an integrity attack but
could also represent an availability attack.
attacks involve generating data, processes,
communications, or other similar activities with a
Fabrication
system. Fabrication attacks primarily affect integrity
but could be considered an availability attack as well.
is the likelihood that an event will occur. To have risk
Risk there must be a
threat and vulnerability.
are any events being man-made, natural or
Threats
environmental that could cause damage to assets.
are a weakness that a threat event or the threat agent
Vulnerabilities
can take advantage of.
takes into account the value of the asset being
Impact
threatened and uses it to calculate risk
Identify assets, identify threats, assess vulnerabilities,
Risk Management Process
assess risks, mitigate risks
https://quizlet.com/1044334422/c836-fundamentals-of-information-security-wguwgu-c836-fundamentals-of-information-security-latest-exam-2023-202… 2/13