7 questions
in the CIA triad, what does cyber security protect in integrity
the level of assurance, which can be given as to the accuracy and trustworthiness of the data
the level of assurance, that the data will be available to those who need it when they want it
rules which restrict access only to those who need to know
the financial position of personal data and any confidential information
what does the CIA triad stand for
central intelligence agency
conformity, intellect, availability
confidentiality, integrity, availability
conformity, integrity, assurance
definition: allowing information to pass to any person or organisation without permission
unauthorized closure
unauthorized inspection
unauthorized access
unauthorized disclosure
what are the 4 types of cyber security incidents
authorized access, inspection, modification, disclosure
adware, spyware, virus, Trojan
unauthorized access, inspection, modification, disclosure
not following protocols, physical security breaches, firewall breaches, president trump
theft if a type of cyber security incidents
true
false
destruction of data is preventing someone from being able to access certain data
true
false
pick two: theft of data is....
stealing data from an individual or organisation with the intention to....
obtaining information without the correct authorization in order to....
gain an insight to the workings of another individual or organisation
profit from the information