1
DETAILED ANSWERS|LATEST
PASS Confidentiality - ANSWER WHO can access the data
Integrity - ANSWER keeping data UNALTERED
Availability - ANSWER for ones AUTHORIZED to ACCESS data when needed
Confidential - ANSWER allowing only those authorized to access the data requested
Integrity - ANSWER keeping data unaltered in an unauthorized manner and reliable
Availability - ANSWER the ability for those authorized to access data when needed
CIA Triad - ANSWER Confidentiality, Integrity, Availability
Parkerian Hexad - ANSWER Confidentiality, Availability, Integrity, Possession, Authenticity, Utility
Possession - ANSWER physical deposition of the media on which the data is stored
Authenticity - ANSWER allows us to talk about the proper attribution as to the owner or creator of the data in question
- / 2
2
Utility - ANSWER how useful the data is to us
Interception - ANSWER an attacker has access to data, applications, or environment (effects confidentiality)
Interruption - ANSWER attacks cause our assets to become unusable or unavailable (effects integrity and availability)
Modification - ANSWER attacks involve tampering with our asset (effects integrity and availability)
Fabrication - ANSWER attacks that create false information (effects integrity and avaliblilty)
Threat - ANSWER something that has potential to cause harm
Vulnerability - ANSWER weaknesses that can be used to harm us
Authentication - ANSWER verifying that a person is who they claim to be
Something you know: - ANSWER username, password, PIN
Something you have: - ANSWER ID badge, swipe card, OTP
Something you are: - ANSWER fingerprint, Iris, Retina scan
Somewhere you are: - ANSWER geolocation
- / 2