1
CORRECT WELL DETAILED ANSWERS|LATEST
PASS Confidentiality - ANSWER WHO can access the data
Integrity - ANSWER keeping data UNALTERED
Availability - ANSWER for ones AUTHORIZED to ACCESS data when needed
FISMA - ANSWER the FI stands for "federal information"
FERPA - ANSWER the E stands for "educational"
HIPPA - ANSWER the HI stands for "health insurance"
HITECH - ANSWER TECH means "technology"
PCI DSS - ANSWER the C stands for "credit card"
COPPA - ANSWER the CO stands for "children online"
SOX - ANSWER rhymes with "stocks", so think of finance
GLBA - ANSWER The Gramm-Leach-Bliley Act requires financial institutions - companies that offer consumers financial products or services like loans, financial or 1 / 3
2
investment advice, or insurance - to explain their information-sharing practices to their customers and to safeguard sensitive data
CIA Triad - ANSWER Confidential - allowing only those authorized to access the data requested Integrity - keeping data unaltered in an unauthorized manner and reliable Availability - the ability for those authorized to access data when needed
Parkerian Hexad - ANSWER Parkerian Hexad Confidentiality - allowing only those authorized to access the data requested Integrity - keeping data unaltered without detection Availability - the ability to access data when needed Possession - physical deposition of the media on which the data is stored Authenticity - allows us to talk about the proper attribution as to the owner or creator of the data in question Utility - how useful the data is to us
Possession - ANSWER physical deposition of the media on which the data is stored
Authenticity - ANSWER allows us to talk about the proper attribution as to the owner or creator of the data in question
Utility - ANSWER how useful the data is to us
Attack types - ANSWER Interception, Interruption, Modification, and Fabrication
Interception - ANSWER an attacker has access to data, applications, or environment -the ONLY attack on confidentiality 2 / 3
3
Interruption - ANSWER attacks cause our assets to become unusable or unavailable
Modification - ANSWER attacks involve tampering with our asset
Fabrication - ANSWER attacks that create false information
Threat - ANSWER something that has potential to cause harm
Vulnerability - ANSWER weaknesses that can be used to harm us
Authentication - ANSWER verifying that a person is who they claim to be
Something you know - ANSWER username, password, PIN
Something you have - ANSWER ID badge, swipe card, OTP
Something you are - ANSWER fingerprint, Iris, Retina scan
Somewhere you are - ANSWER geolocation
Something you do - ANSWER handwriting, typing, walking
Mutual authentication - ANSWER both parties in a transaction to authenticate each other -Has digital certificates -Prevents man in the middle attacks
- / 3