WGU D430 Fundamentals of Information Security Exam Study Guide Questions and Correct Detailed Answers (Verified Answers) | Already Graded A+ 2024
Information security - Keeping data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction. Compliance - The requirements that are set forth by laws and industry regulations. Example : HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal government agencies CIA - The core model of all information security. Confidential, integrity and availability Confidential - Allowing only those authorized to access the data requested integrity - Keeping data unaltered by accidental or malicious intent Availability - The ability to access data when needed Parkerian hexad model - Confidentiality , integrity, availability, possession/control, authenticity, utility Possession/ control - Refers to the physical disposition of the media on which the data is stored authenticity - Allows us to talk about the proper attribution as to the owner or creator of the data in question Utility - How useful the data is to us Types of attacks - 1- interception 2- interruption 3- modification 4- fabrication Interception - Attacks allows unauthorized users to access our data, applications, or environments. Are primarily an attack against confidentiality Interruption - Attacks cause our assets to become unstable or unavailable for our use, on a temporary or permanent basis. This attack affects availability but can also attack integrity
Written for
- Institution
-
Western Governors University
- Course
-
WGU D430 (D430)
Document information
- Uploaded on
- September 2, 2024
- Number of pages
- 30
- Written in
- 2024/2025
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Also available in package deal