SOLUTION TESTED QUESTIONS
● Integrity. Answer: keeping data unaltered in an unauthorized manner
and reliable/ keeping data UNALTERED
● Availability. Answer: the ability for those authorized to access data
when needed
● C.I.A.. Answer: Confidentiality
Integrity
Availability
● Parkerian Hexad. Answer: Confidentiality - allowing only those
authorized to access the data requested
Integrity - keeping data unaltered without detection
Availability - the ability to access data when needed
Possession - physical deposition of the media on which the data is stored
,Authenticity - allows us to talk about the proper attribution as to the
owner or creator of the data in question
Utility - how useful the data is to us
● Attack Types. Answer: Interception - an attacker has access to data,
applications, or environment
Interruption - attacks cause our assets to become unusable or unavailable
Modification - attacks involve tampering with our asset
Fabrication - attacks that create false information
● Threat. Answer: something that has potential to cause harm
● Vulnerability. Answer: weaknesses that can be used to harm us
● Authentication. Answer: verifying that a person is who they claim to
be
● Something you know. Answer: username, password, PIN
, ● Something you have. Answer: ID badge, swipe card, OTP
● Something you are. Answer: fingerprint, Iris, Retina scan
● Somewhere you are. Answer: geolocation
● Something you do. Answer: handwriting, typing, walking
● Mutual authentication. Answer: both parties in a transaction to
authenticate each other
● Risk management process. Answer: 1. Identify Asset - identifying and
categorizing assets that we're protecting
2. Identify Threats - identify threats
3. Assess Vulnerabilities - look for impacts
4. Assess Risk - asses the risk overall
5. Mitigate Risk - ensure that a given type of threat is accounted for