1
WELL DETAILED ANSWERS|LATEST
PASS Confidentiality (CIA Triad) - ANSWER refers to our ability to protect our data from those who are not authorize to use/view it.
intergrity ( CIA Triad ) - ANSWER is the ability to prevent people from changing your data in an unauthorized or undesirable manner
availability ( CIA Triad) - ANSWER refers to the ability to access our data when we need it.
The Parkerian Hexad - ANSWER a less well-known model named after Donn Parker. A complex variation of the the classic CIA triad. It Consists of Confidentiality, integrity, availability as well as possession or control, authenticity, and utility. A total of 6 principles.
possesion or control ( the parkerian Hexad) - ANSWER refers to the physical disposition of the media on which the data is stored.
authenticity ( the parkerian Hexad) - ANSWER allows you to say whether you've attributed the data in question to the proper owner or creator
Utility ( the parkerian Hexad) - ANSWER refers how useful data is to you. is also the only the parkerian Hexad that is not necessarily binary in nature. can have a variety of degrees
interceptions ( four types of attacks) - ANSWER this attack allows unauthorized users to access your data, applications, or environments, and they are primarily attacks against confidentiality 1 / 2
2
Data at Rest - ANSWER is stored data that is not in the process of being moved from one place to another
Data in motion - ANSWER is data that is moving from one place to another. usually protected by encryption
interruption ( four types of attacks) - ANSWER make your assets unusable or unavailable to you on a temporary or permeant basis ( these types of attacks often affect availability but can affect integrity, as well)
modification ( four types of attacks ) - ANSWER involves tampering with an asset. Such attacks might primarily be considered attacks on integrity but could also represents attacks on availability.
Fabrication ( four types of attacks) - ANSWER attacks involve generating data, processes, communications, or other similar material with a system. Ex, generating fake information in a database. primarily affects integrity but could affect availability, as well
Threats - ANSWER is something that has the potential to cause harm to your assets
Vunerabilities - ANSWER are weaknesses, or holes, that threats can exploit to cause you harm.
Risk - ANSWER is the likelihood that something bad will happen. for you to have a R____environment you need to have both a threat and a vulnerability that the threat could exploit.
Impact - ANSWER takes into account the value of the asset being threatened and uses it to calculate risk.
- / 2