100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

C836 - Fundamentals of Information Security (WGU)|latest update study guide

Puntuación
-
Vendido
-
Páginas
32
Grado
A+
Subido en
25-11-2024
Escrito en
2024/2025

C836 - Fundamentals of Information Security (WGU)|latest update study guide

Institución
C836 - Fundamentals Of Information Security
Grado
C836 - Fundamentals of Information Security











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
C836 - Fundamentals of Information Security
Grado
C836 - Fundamentals of Information Security

Información del documento

Subido en
25 de noviembre de 2024
Número de páginas
32
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

C836 - Fundamentals of Information
Security (WGU)|latest update study
guide



Information Security - ANSWER >>>>>Protecting an organization's
information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.

Compliance - ANSWER >>>>>Requirements that are set forth by laws
and industry regulations.

CIA - ANSWER >>>>>Confidentiality, Integrity, Availability

Confidentiality - ANSWER >>>>>Refers to our ability to protect our data
from those who are not authorized to use/view it

Integrity - ANSWER >>>>>The ability to prevent people from changing
your data in an unauthorized or undesirable manner

Availability - ANSWER >>>>>Refers to the ability to access our data
when we need it

Utility - ANSWER >>>>>refers to how useful the data is to you.

Attacks - ANSWER >>>>>interception, interruption, modification, and
fabrication

Interception - ANSWER >>>>>attacks that allow unauthorized users to
access your data, applications, or environments. Are primarily attacks
against confidentiality

,Interruption - ANSWER >>>>>attacks that make your assets unusable or
unavailable to you temporarily or permanently. DoS attack on a mail
server, for example. May also affect integrity

Modification - ANSWER >>>>>attacks involve tampering with our asset.
Such attacks might primarily be considered an integrity attack but could
also represent an availability attack.

Fabrication - ANSWER >>>>>attacks involve generating data, processes,
communications, or other similar activities with a system. Fabrication
attacks primarily affect integrity but could be considered an availability
attack as well.

Risk - ANSWER >>>>>is the likelihood that an event will occur. To have
risk there must be a threat and vulnerability.

Risk Management Process - ANSWER >>>>>Identify assets, identify
threats, assess vulnerabilities, assess risks, mitigate risks

Defense in Depth - ANSWER >>>>>Using multiple layers of security to
defend your assets.

Controls - ANSWER >>>>>are the ways we protect assets. Three
different types: physical, logical, administrative

Physical Controls - ANSWER >>>>>environment; physical items that
protect assets think locks, doors, guards, and, fences or environmental
factors (time)

Logical Controls - ANSWER >>>>>Sometimes called technical controls,
these protect the systems, networks, and environments that process,
transmit, and store our data

Administrative Controls - ANSWER >>>>>based on laws, rules, policies,
and procedures, guidelines, and other items that are "paper" in nature.

,They are the policies that organizations create for governance. For
example, acceptable use and email use policies.

Preparation - ANSWER >>>>>phase of incident response consists of all
of the activities that we can perform, in advance of the incident itself, in
order to better enable us to handle it.

Incident Response Process - ANSWER >>>>>1. Preparation
2. Detection and Analysis (Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity: document/Lessons learned

Detection & Analysis - ANSWER >>>>>where the action begins to
happen in our incident response process. In this phase, we will detect
the occurrence of an issue and decide whether or not it is actually an
incident, so that we can respond appropriately to it.

Containment - ANSWER >>>>>involves taking steps to ensure that the
situation does not cause any more damage than it already has, or to at
least lessen any ongoing harm.

Post-incident activity - ANSWER >>>>>determine specifically what
happened, why it happened, and what we can do to keep it from
happening again. (postmortem).

Identity - ANSWER >>>>>who or what we claim to be. Simply an
assertion.

Authentication - ANSWER >>>>>the act of providing who or what we
claim to be. More technically, the set of methods used to establish
whether a claim is true

, Verification - ANSWER >>>>>simply verifies status of ID. For example,
showing your driver's license at a bar. "Half-step" between identity and
authentication

Five Different Types of Authentication - ANSWER >>>>>• Something
you know: Username/Password/Pin
• Something you have: ID badge/swipe card/OTP
• Something you are: Fingerprint/Iris/Retina scan
• Somewhere you are: Geolocation
• Something you do: Handwriting/typing/walking

Single-factor authentication - ANSWER >>>>>only using one type of
authentication

Dual-factor authentication - ANSWER >>>>>using two different factors
of authentication (2 of the same factor does not count )

Multi-factor authentication - ANSWER >>>>>Use of several (more than
two) authentication techniques together, such as passwords and
security tokens, and geolocation.

Mutual Authentication - ANSWER >>>>>process where the session is
authenticated on both ends and just one end.

Mutual authentication prevents what kind of attacks? - ANSWER
>>>>>man-in-the-middle attacks

Using a password for access is what kind of authentication - ANSWER
>>>>>Something you know

An iris-scan for access is what kind of authentication - ANSWER
>>>>>Something you are

Using a security key-fob for access is what kind of authentication -
ANSWER >>>>>Something you have
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
MREXAMS Howard university
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
21
Miembro desde
1 año
Número de seguidores
1
Documentos
602
Última venta
3 días hace

4.0

2 reseñas

5
1
4
0
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes