questions n answers A+ rated
Measures and controls that ensure confidentiality, integrity, and availability of information
system assets including hardware, software, firmware, and information being processed, stored,
and communicated.
(includes CIA Triad + additional security concepts) - correct answer ✔✔Computer Security
Preserving authorized restrictions on information access and disclosure, including means for
protecting personal privacy and proprietary information.
(In a company, each employee will be given a level of access that they are allowed to
themselves and only themselves) - correct answer ✔✔Confidentiality
Guarding against improper information modification or destruction, including ensuring
information non repudiation and authenticity
(honesty with your work and the work of others in a company) - correct answer ✔✔Integrity
Ensuring that the systems run reliably and authorized users are not denied of any service
(employees at a company can trust that the company will give them the access they need to do
their work) - correct answer ✔✔Availability
The property of being genuine and being able to be verified and trusted; confidence in the
validity of a transmission, a message, or message originator
, (a company you can trust to keep your data safe, familiarity) - correct answer ✔✔Authenticity
The security goal that generates the requirement for
actions of an entity to be traced uniquely to that entity
(the system itself keeps track of itself and makes sure there are no security breaches and if
there are, the proper method is used to protect the system) - correct answer ✔✔Accountability
The loss could be expected to have a LIMITED adverse effect on
organizational operations, organizational assets, or individuals - correct answer ✔✔LOW (Levels
of Security Breach Impact)
The loss could be expected to have a SERIOUS adverse
effect on organizational operations, organizational assets, or
individuals - correct answer ✔✔MODERATE (Levels of Security Breach Impact)
The loss could be expected to have a SEVERE OR CATASTROPHIC
adverse effect on organizational operations, organizational assets, or
individuals - correct answer ✔✔HIGH (Levels of Security Breach Impact)
When creating computer security, it isn't easy, there are security mechanisms or algorithms that
need to be set in place before a physical model can be set.
One must always see what potential attacks could happen to the system.
placement of computer security needs to be determined (cloud, physical location)