Cybersecurity Fundamentals - CIA Triad

¡Supera tus tareas y exámenes ahora con Quizwiz!

When a website is down and you cannot access it, this violates the CIA principle of

Availability

Authentication

A method for confirming a users' identity.

_____________ allows a person access to information that they need to do their work on a computer. Teachers and students have different _____________ on SIS because teachers can see information for all of their students but students can only see their information.

authorization

What determines what you can access on a computer network once you are logged in?

Access Control

CIA

Confidentiality, integrity, and availability. These three form the security triad.

Availability

Indicates that data and services are available when needed. Examples: When you log into Google Classroom, your work is accessible. When you want to use the internet, the modem is plugged into a power source.

Which of the following ensures data is NOT changed when the data should not be changed?

Integrity

Biometric

Physical characteristics such as fingerprints, retinal scans, or voiceprints. Authentication by a physical characteristic.

An example of proving your identity (authentication) by something that you have is:

Access cards, key fobs or other physical items.

Confidentiality

Helps prevent the unauthorized disclosure of data. Example: your doctor can only provide information about you to you (and parent/guardian).

An example of proving your identity (authentication) by something you are is:

Iris scan, fingerprint scan, voice recognition, facial recognition. Biometric information.

Integrity

Provides assurances that data has not been modified, tampered with, or corrupted. Example: Students can't change grades in SIS.

An example of proving your identity (authentication) by something you know is:

Providing your username and password to login.

Verifying that a user is who they say they by use of passwords, biometrics, keycards is also known as:

authentication

Which of the following is NOT a biometric (physical characteristic) device?

password login

What is the most common authentication method?

to provide something you know (password)

Which of the following is a characteristic of multi-factor authentication?

two or more different methods proving who you are


Conjuntos de estudio relacionados

Photosynthesis, Sunlight, Carbon dioxide,Water and Oxygen

View Set

Summary of the HIPAA Security Rule

View Set

US Geography - Quiz 1-2 "The Midwest and the Mississippi River"

View Set

Forensic Science Lesson 6 Forensic Biometrics

View Set

Ch. 19: : Male Genital Tract Quiz

View Set

Entschuldigung, wo ist...? Wegbeschreibung

View Set

Chapter 20: Nursing Management of the Pregnancy at Risk: Selected Health Conditions and Vulnerable Populations

View Set

Government and Economics Unit 5 Lesson 4 The Christian and Public Opinion

View Set