Cybersecurity Fundamentals - CIA Triad
When a website is down and you cannot access it, this violates the CIA principle of
Availability
Authentication
A method for confirming a users' identity.
_____________ allows a person access to information that they need to do their work on a computer. Teachers and students have different _____________ on SIS because teachers can see information for all of their students but students can only see their information.
authorization
What determines what you can access on a computer network once you are logged in?
Access Control
CIA
Confidentiality, integrity, and availability. These three form the security triad.
Availability
Indicates that data and services are available when needed. Examples: When you log into Google Classroom, your work is accessible. When you want to use the internet, the modem is plugged into a power source.
Which of the following ensures data is NOT changed when the data should not be changed?
Integrity
Biometric
Physical characteristics such as fingerprints, retinal scans, or voiceprints. Authentication by a physical characteristic.
An example of proving your identity (authentication) by something that you have is:
Access cards, key fobs or other physical items.
Confidentiality
Helps prevent the unauthorized disclosure of data. Example: your doctor can only provide information about you to you (and parent/guardian).
An example of proving your identity (authentication) by something you are is:
Iris scan, fingerprint scan, voice recognition, facial recognition. Biometric information.
Integrity
Provides assurances that data has not been modified, tampered with, or corrupted. Example: Students can't change grades in SIS.
An example of proving your identity (authentication) by something you know is:
Providing your username and password to login.
Verifying that a user is who they say they by use of passwords, biometrics, keycards is also known as:
authentication
Which of the following is NOT a biometric (physical characteristic) device?
password login
What is the most common authentication method?
to provide something you know (password)
Which of the following is a characteristic of multi-factor authentication?
two or more different methods proving who you are