WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY STUDY
GUIDE ||UPDATED 2025
, lOMoARcPSD| 54339004
Study Guide
Module 1: Information Security
1.1 Understanding Information Security
CIA Triad and Parkerian Hexad
CIA Triad:
Confidentiality: Ensures that information is not disclosed to
Integrity:unauthorized individuals or systems.
Guarantees the accuracy and reliability of information and
Availability: systems.
Ensures that information and systems are accessible and
usable when needed.
Parkerian Hexad:
Possession: Concerns the physical control of an object or information. tes
Utility: Rela to the functionality and usefulness of the object or
information.
• Authenticit y: Involves confirming the origin and integrity of the
object or info rmation.
• Confidentia lity: Ensures that information is not disclosed to
unauthorized parties. uarantees that information is accurate and
Integrity: unaltered.
• Availability: when d.Ensures that information and systems are accessible
neede
Types of Attacks
Interception: Unauthorized access to communication or data. Disruption
Interruption: or prevention of authorized access to
resources.
INFORMATION SECURITY STUDY
GUIDE ||UPDATED 2025
, lOMoARcPSD| 54339004
Study Guide
Module 1: Information Security
1.1 Understanding Information Security
CIA Triad and Parkerian Hexad
CIA Triad:
Confidentiality: Ensures that information is not disclosed to
Integrity:unauthorized individuals or systems.
Guarantees the accuracy and reliability of information and
Availability: systems.
Ensures that information and systems are accessible and
usable when needed.
Parkerian Hexad:
Possession: Concerns the physical control of an object or information. tes
Utility: Rela to the functionality and usefulness of the object or
information.
• Authenticit y: Involves confirming the origin and integrity of the
object or info rmation.
• Confidentia lity: Ensures that information is not disclosed to
unauthorized parties. uarantees that information is accurate and
Integrity: unaltered.
• Availability: when d.Ensures that information and systems are accessible
neede
Types of Attacks
Interception: Unauthorized access to communication or data. Disruption
Interruption: or prevention of authorized access to
resources.