C845 INFORMATION SYSTEMS SECURITY: CH.1
Confidentiality - Answers -Limits are placed on who is allowed to view the information,
including copying it to another form.
Integrity - Answers -The information stays complete and correct when retrieved,
displayed, or acted upon.
Availability - Answers -The information is presented to the user in a timely manner
when required and in a form and format that meets the user's needs.
Authenticity - Answers -Only previously approved, known, and trusted users or
processes have been able to create, modify, move, or copy the information.
Utility - Answers -The content of the information, its form and content, and its
presentation or delivery to the user meet the user's needs.
Possesion or Control - Answers -The information is legally owned or held by a known,
authorized user, such that the user has authority to exert control over its use, access,
modification, or movement.
Safety - Answers -The system and its information, by design, do not cause
unauthorized hard or damage to others, their property, or their lives.
Privacy - Answers -Information that attests to or relates to the identity of a person, or
links specific activities to that identity, but must me protected from being accessed,
viewed, copied, modified, or otherwise used by unauthorized persons or systems.
Nonrepudiation - Answers -Users who created, used, viewed, or accessed the
information, or shared it with others, cannot later deny that they did so.
Transparency - Answers -The information can be reviewed, audited, and made visible
or shared with competent authorities for regulatory, legal, or other processes that serve
the public good.
CIA Triad - Answers -Confidentiality, Integrity, and Availability.
CIANA - Answers -Combines Confidentiality, Integrity, Availability, Nonrepudiation, and
Authentication.
CIANA+PS - Answers -Expands CIANA to include Privacy and Safety.
, Parkerian Hexad - Answers -Includes confidentiality, integrity, availability, authenticity,
utility, and possession or control.
Intellectual Property - Answers -The ideas that we create and express in tangible,
explicit form; in creating them, we create an ownership interest.
Patent - Answers -Public Disclosure - Mandatory, Detailed. Monetized By - License to
use. Compromise by - failure to develop or monetize; failure to defend against
infringement.
Copyright - Answers -Public Disclosure - Published Works. Monetize by - Sell copies.
Compromise by - failure to defend.
Trademark - Answers -Public Disclosure - Logos, Signs, Product Stampings. Monetize
by - Create brand awareness in marketplace. Compromise by - failure to defend.
Trade Secret - Answers -Public Disclosure - Must me undisclosed. Monetize by - Sell
products and services based on its use; can be licensed. Compromise by - failure to
keep secret or defend.
The Security Triad - Answers -Confidentiality - Protects information and systems from
unauthorized use. Integrity - Protects information and systems from unauthorized
modification. Availability - ensures that information and systems for authorized users are
available when needed.
Hash Function - Answers -Hashes the contents of the file and is used to easily show if
the contents have been modified. This helps protect the integrity of a file.
Digital Certificate - Answers -Transmits public keys securely
Ways to protect Availability - Answers -Include redundant components, high availability,
fault tolerance, and keeping OS and applications updated and patched
Steganography - Answers -Hiding information within something else, such as an image
Ethics Code Canon 1 - Answers -Protect society, the common good, necessary public
trust and confidence, and the infrastructure
Ethics Code Canon 2 - Answers -Act honorably, honest, justly, responsibly, and legally
Ethics Code Canon 3 - Answers -Serve principals diligently and competently
Ethics Code Canon 4 - Answers -Advance the information security profession
Strong Identification and Authentication methods - Answers -Help with Accountability
Confidentiality - Answers -Limits are placed on who is allowed to view the information,
including copying it to another form.
Integrity - Answers -The information stays complete and correct when retrieved,
displayed, or acted upon.
Availability - Answers -The information is presented to the user in a timely manner
when required and in a form and format that meets the user's needs.
Authenticity - Answers -Only previously approved, known, and trusted users or
processes have been able to create, modify, move, or copy the information.
Utility - Answers -The content of the information, its form and content, and its
presentation or delivery to the user meet the user's needs.
Possesion or Control - Answers -The information is legally owned or held by a known,
authorized user, such that the user has authority to exert control over its use, access,
modification, or movement.
Safety - Answers -The system and its information, by design, do not cause
unauthorized hard or damage to others, their property, or their lives.
Privacy - Answers -Information that attests to or relates to the identity of a person, or
links specific activities to that identity, but must me protected from being accessed,
viewed, copied, modified, or otherwise used by unauthorized persons or systems.
Nonrepudiation - Answers -Users who created, used, viewed, or accessed the
information, or shared it with others, cannot later deny that they did so.
Transparency - Answers -The information can be reviewed, audited, and made visible
or shared with competent authorities for regulatory, legal, or other processes that serve
the public good.
CIA Triad - Answers -Confidentiality, Integrity, and Availability.
CIANA - Answers -Combines Confidentiality, Integrity, Availability, Nonrepudiation, and
Authentication.
CIANA+PS - Answers -Expands CIANA to include Privacy and Safety.
, Parkerian Hexad - Answers -Includes confidentiality, integrity, availability, authenticity,
utility, and possession or control.
Intellectual Property - Answers -The ideas that we create and express in tangible,
explicit form; in creating them, we create an ownership interest.
Patent - Answers -Public Disclosure - Mandatory, Detailed. Monetized By - License to
use. Compromise by - failure to develop or monetize; failure to defend against
infringement.
Copyright - Answers -Public Disclosure - Published Works. Monetize by - Sell copies.
Compromise by - failure to defend.
Trademark - Answers -Public Disclosure - Logos, Signs, Product Stampings. Monetize
by - Create brand awareness in marketplace. Compromise by - failure to defend.
Trade Secret - Answers -Public Disclosure - Must me undisclosed. Monetize by - Sell
products and services based on its use; can be licensed. Compromise by - failure to
keep secret or defend.
The Security Triad - Answers -Confidentiality - Protects information and systems from
unauthorized use. Integrity - Protects information and systems from unauthorized
modification. Availability - ensures that information and systems for authorized users are
available when needed.
Hash Function - Answers -Hashes the contents of the file and is used to easily show if
the contents have been modified. This helps protect the integrity of a file.
Digital Certificate - Answers -Transmits public keys securely
Ways to protect Availability - Answers -Include redundant components, high availability,
fault tolerance, and keeping OS and applications updated and patched
Steganography - Answers -Hiding information within something else, such as an image
Ethics Code Canon 1 - Answers -Protect society, the common good, necessary public
trust and confidence, and the infrastructure
Ethics Code Canon 2 - Answers -Act honorably, honest, justly, responsibly, and legally
Ethics Code Canon 3 - Answers -Serve principals diligently and competently
Ethics Code Canon 4 - Answers -Advance the information security profession
Strong Identification and Authentication methods - Answers -Help with Accountability