Information Security and the CIA Triad

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a part of what information security involves?

  • Preventing unlawful use of data
  • Promoting devaluation of information (correct)
  • Mitigating information risks
  • Controlling unauthorized access to data

InfoSec is a rarely used term that describes a very specific subset of information security practices.

False (B)

In the context of information security, what does 'mitigating' information risks involve?

Reducing risks

Information security is a part of information ______ management.

<p>risk</p> Signup and view all the answers

In the context of ATM security, which element of the CIA triad is primarily addressed by using two-factor authentication with a PIN code?

<p>Confidentiality (D)</p> Signup and view all the answers

Data integrity, in the context of ATM systems, is maintained solely through physical security measures.

<p>False (B)</p> Signup and view all the answers

Explain how the availability aspect of the CIA triad is demonstrated by ATMs.

<p>public use and accessible at all times</p> Signup and view all the answers

The CIA triad includes confidentiality, integrity, and ______.

<p>availability</p> Signup and view all the answers

What is the primary goal of 'confidentiality' within the CIA Triad?

<p>Protecting data from unauthorized access (A)</p> Signup and view all the answers

Integrity, as part of the CIA Triad, primarily focuses on ensuring data is accessible, even if it has been slightly modified by unauthorized users.

<p>False (B)</p> Signup and view all the answers

Define the term 'availability' in the context of the CIA Triad.

<p>timely and reliable access</p> Signup and view all the answers

The CIA Triad ensures that information is protected with respect to confidentiality, integrity, and ______.

<p>availability</p> Signup and view all the answers

Which of the following best defines information assurance (IA)?

<p>The practice of mitigating risks related to information, including integrity, availability, and confidentiality. (D)</p> Signup and view all the answers

Information assurance only includes digital protections, not physical techniques.

<p>False (B)</p> Signup and view all the answers

Define what is meant by 'data in transit' in the context of information assurance.

<p>data being transmitted</p> Signup and view all the answers

______ is best thought of as a superset of information security, encompassing both digital and physical protections.

<p>IA</p> Signup and view all the answers

Which of the following is NOT considered a core pillar of Information Assurance?

<p>Obfuscation (A)</p> Signup and view all the answers

Non-repudiation assures that someone can deny the validity of something.

<p>False (B)</p> Signup and view all the answers

Briefly describe the purpose of 'confidentiality' as a pillar of information assurance.

<p>protect access to data/information</p> Signup and view all the answers

______ is the pillar of information assurance that guards against improper information modification or destruction.

<p>Integrity</p> Signup and view all the answers

Which perspective best describes information security when considering the implementation of complex systems with no single correct solution?

<p>As an art requiring creative problem-solving. (A)</p> Signup and view all the answers

There is a universally accepted manual for implementing security throughout an entire computer system.

<p>False (B)</p> Signup and view all the answers

Describe why some aspects of information security can be considered an 'art'.

<p>no hard and fast rules</p> Signup and view all the answers

Implementation of information security is a mixture of art and ______.

<p>science</p> Signup and view all the answers

How does the 'science' aspect of information security manifest?

<p>Via the resolution of faults by developers. (B)</p> Signup and view all the answers

Virtually every computer fault and security hole is unpredictable and cannot be traced back to interactions of specific hardware and software.

<p>False (B)</p> Signup and view all the answers

According to the content, what creates nearly every fault, security hole, and systems malfunction?

<p>hardware and software interaction</p> Signup and view all the answers

The science behind information security involves dealing with technology designed to operate at high levels of ______.

<p>performance</p> Signup and view all the answers

Which element does social science bring to the understanding of information security?

<p>The behavior of individuals interacting with systems. (B)</p> Signup and view all the answers

Security begins and ends with technology, not the individuals interacting with the system.

<p>False (B)</p> Signup and view all the answers

How can security administrators reduce risks caused by end users, according to a social science perspective?

<p>acceptable and supportable security profiles</p> Signup and view all the answers

Social science examines the behavior of individuals ______ with systems.

<p>interacting</p> Signup and view all the answers

What concept emphasizes the importance of individuals having autonomy over their information and not leaving it solely in the hands of corporations?

<p>Data ownership (C)</p> Signup and view all the answers

According to the content, the Cambridge Analytica scandal demonstrated the benefits of strong data protection measures.

<p>False (B)</p> Signup and view all the answers

According to the content, what was the Cambridge Analytica scandal a misuse of?

<p>data</p> Signup and view all the answers

The concept underlines the right of individuals to own and control their ______.

<p>data</p> Signup and view all the answers

According to the provided content, which of the following is a potential consequence of the 'black market' for personal information?

<p>Identity theft and financial fraud (A)</p> Signup and view all the answers

In the black market of personal information, the trading of medical records poses no risk to individuals.

<p>False (B)</p> Signup and view all the answers

Name one activity through which black market thrives in personal information.

<p>data breaches.</p> Signup and view all the answers

The black market for personal information involves the illegal buying, selling, or trading of ______ data.

<p>sensitive</p> Signup and view all the answers

Flashcards

Information Security (InfoSec)

Protecting information by mitigating information risks.

CIA Triad

Framework for security policies: Confidentiality, Integrity, Availability.

Confidentiality

Protecting sensitive data from unauthorized access or disclosure.

Integrity

Maintaining the accuracy and completeness of data.

Signup and view all the flashcards

Availability

Ensuring timely and reliable access to data for authorized users.

Signup and view all the flashcards

Information Assurance (IA)

Managing risks related to the use, processing, storage, and transmission of information.

Signup and view all the flashcards

Non-repudiation

Making sure someone can't deny the validity of something.

Signup and view all the flashcards

Authenticiation

Verifying that someone or something is who or what they claim.

Signup and view all the flashcards

Data Ownership

Individuals have the right to own and control their data.

Signup and view all the flashcards

Psychographic profiles

Building a profile bases on psychological characteristics, and demographic data.

Signup and view all the flashcards

Black market for personal information

The illegal buying, selling, or trading of sensitive information.

Signup and view all the flashcards

Identity Theft

Stolen data is used to impersonate individuals for illicit purposes.

Signup and view all the flashcards

Cyder

Browser extension to protects your privacy, blocking trackers, cookies, and ads.

Signup and view all the flashcards

Encryption Tools

Protect data by converting it into an unreadable format that only authorized parties can decrypt.

Signup and view all the flashcards

Password Management Tools

Generate, store, and manage strong, unique passwords for accounts securely

Signup and view all the flashcards

VPN Services

Mask IP addresses and encrypt internet traffic to protect data from being intercepted.

Signup and view all the flashcards

Secure Cloud Storage

Store and share files securely with end-to-end encryption and strict data ownership policies.

Signup and view all the flashcards

Privacy-Focused Browsers:

Privacy-Focused Browsers provide data protection by blocking trackers, ads, and other invasive technologies.

Signup and view all the flashcards

Ad and Tracker Blockers

Prevent websites from tracking users' activities and collecting data.

Signup and view all the flashcards

Data Monitoring and Control Tools

Help users monitor, manage, and control the data they share online.

Signup and view all the flashcards

File Sharing and Collaboration Tools with Privacy.

Share and collaborate on files securely without compromising data ownership

Signup and view all the flashcards

Operating Systems and Software Focused on Privacy

Avoid traditional operating systems that collect telemetry data.

Signup and view all the flashcards

Decentralized Identity Tools.

Provide users control over their identity and personal data, reducing reliance on centralized platforms.

Signup and view all the flashcards

Study Notes

Information Security

  • Also known as InfoSec.
  • The practice of protecting information by mitigating information risks.
  • A part of information risk management.
  • Involves preventing unauthorized access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation.
  • Involves actions intended to reduce the adverse impacts of such incidents.

CIA Triad

  • CIA Triad is Confidentiality, Integrity, and Availability.
  • Confidentiality is the protection of sensitive information from unauthorized access or disclosure.
  • Integrity is the protection of data from unauthorized modification or destruction.
  • Availability is the assurance of timely and reliable access to data and systems by authorized users.
  • ATMs are an example of CIA triad in practice:
    • Two-factor authentication addresses confidentiality by using a debit card combined with a PIN code which ensure only authorized individuals access financial account information.
    • ATM and bank software maintain data integrity by record-keeping of all ATM transfers and withdrawals, ensuring that information is accurate and up-to-date.
    • ATMs offer availability for public use and accessibility at all times.

Information Assurance (IA)

  • IA is also known as also known as IA.
  • IA is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information.
  • IA includes protection of the integrity, availability, authenticity, nonrepudiation, and confidentiality of user data.
  • IA encompasses not only digital protections but also physical techniques that apply to data in transit, both physical and electronic forms, as well as data at rest.
  • IA is considered a superset of information security and the business outcome of information risk management; an umbrella term

5 Pillars of Information Assurance

  • Non-repudiation: Assurance that someone cannot deny the validity of something.
  • Confidentiality: Preserving authorized restrictions on information access & disclosure, e.g., protecting personal privacy & proprietary information.
  • Integrity: Guarding against improper information modification or destruction and includes ensuring information non-repudiation & authenticity.
  • Availability: Ensuring timely and reliable access to and use of information by authorized users.
  • Authentication: The process of determining whether someone or something is, in fact, who or what it declares itself to be.

Information Security: Art or Science?

  • Implementation of information security is often described as a combination of art and science.
  • "Security artisan" idea is based on how individuals perceive systems technologists since computers became commonplace.
  • As an Art, there are no hard and fast rules nor many universally accepted complete solutions.
  • As an Art, there is no manual for implementing security through the entire system.
  • As Science, it deal with technology designed to operate at high levels of performance.
  • Specific conditions cause virtually all actions that occur in computer systems.
  • Nearly every fault, security hole, and systems malfunction results from interaction of specific hardware and software.
  • Developers could resolve and eliminate faults if they had sufficient time.
  • As Social Science, it examines the behavior of individuals interacting with systems.
  • Security begins and ends with the people that interact with the system.
  • Security administrators can greatly reduce levels of risk caused by end-users and create more acceptable and supportable security profiles.

Data Ownership

  • Data ownership is the concept that individuals should have the right to own and have control over their data.
  • Data ownership emphasizes the importance of autonomy over one's information rather than leaving it in the hands of corporations or third parties.

Why Data Ownership Matters

  • There are are risks associated with the misuse of data.
  • Data misuse occurred in the Cambridge Analytica scandal, where the political consulting firm figured out a loophole to harvest the data of 87 million Facebook users to try to influence the 2016 election.
  • This scandal highlighted vulnerabilities in data protection and led to a global demand for stricter data protection measures.
  • A third-party app called "This Is Your Digital Life," developed by Dr. Aleksandr Kogan, was a personality quiz on Facebook.
  • The app collected data from users who took the quiz and from their Facebook friends without explicit consent.
  • Approximately 270,000 users took the quiz, but the app accessed data from over 87 million Facebook users globally.
  • Kogan shared this data with Cambridge Analytica, a political consulting firm, violating Facebook's policies.
  • Cambridge Analytica used the harvested data to build psychographic profiles of individuals which helped craft highly targeted political ads and messages to influence voting behavior.
  • There is a lack of control on data collection.
  • Mozilla Foundation examined the privacy policies of 25 car brands and found they are the "worst product category for privacy".
  • Nissan's privacy policy indicates it can collect deeply personal data, from genetic information to sexual activity.
  • Users are often unaware of the extent of data collected or why sensitive data is necessary for products like cars, such as in Nissan's case.
  • Individuals ownership is often assumed by companies once data is collected through vague or one-sided privacy policies.
  • Companies like Nissan collect data through vague or one-sided privacy policies
  • Many users do not fully understand or review privacy policies; therefore, they effectively give up ownership and control of their data without informed consent.
  • Black market of personal information exists where companies make millions collecting, packaging, and selling our data.
  • Acxiom, a leading global data broker, made $617M in revenue in 2022 from processing personal information.
  • The black market for personal information involves the illegal buying, selling, or trading of sensitive data, including names, addresses, credit card details, medical records, and login credentials.
  • This shadowy economy thrives on data breaches, hacking, phishing, and insider theft, posing significant risks to individuals, businesses, and governments.

Threats

  • Identity Theft: Stolen data can be used to impersonate individuals, access bank accounts, or commit fraud.
  • Financial Fraud: Credit card numbers and bank details are sold to carry out unauthorized transactions.
  • Privacy Violations: Sensitive personal data (e.g., medical history or intimate details) can be exploited for blackmail or harassment.
  • Corporate Espionage: Competitors may purchase stolen intellectual property, trade secrets, or customer data.
  • Cybersecurity Risks: Stolen credentials (e.g., usernames and passwords) enable attackers to access secure systems or launch ransomware attacks.

Top Cybercrime Organizations/Groups (as of 2024)

  • REvil (Ransomware Group): A cybercrime organization involved in ransomware attacks, where they steal sensitive data and sell it on black markets or extort victims.
  • Fin7 (Carbanak Group): A cybercriminal organization specializing in hacking financial institutions and selling stolen credit card information.
  • DarkMarket: Once the largest dark web marketplace where stolen data, drugs, and illegal services were traded.
  • Genesis Market: Notorious online marketplace selling stolen credentials and digital fingerprints, enabling buyers to impersonate individuals online.
  • Conti Group: A ransomware group known for exfiltrating sensitive corporate data and either selling it or using it for extortion.

Solutions for better data ownership

  • Privacy Tools such as Cyder empower users to take control of their data, Cyder is a browser extension that protects your privacy by blocking trackers, cookies, and ads.
  • Privacy Legislation need improved laws to set standards and hold entities accountable for their privacy practices and for better privacy laws as technology advances.
  • Must set strict guidelines for data collection to to give individuals greater control over their privacy, and (c) impose heavy fines on organizations that do not comply.
  • Blockchain Technology: It is decentralized, secure, and transparent.

Tools for Data Security

  • Encryption Tools: Protect data by converting it into an unreadable format that only authorized parties can decrypt.
    • ProtonMail (secure email with end-to-end encryption)
    • Signal (encrypted messaging platform)
    • VeraCrypt (data encryption for files and drives)
  • Password Management Tools: Generate, store, and manage strong, unique passwords for accounts securely
    • LastPass
    • 1Password
    • Bitwarden
  • Virtual Private Network (VPN) Services: Mask IP addresses and encrypt internet traffic to protect data from being intercepted.
    • NordVPN
    • ExpressVPN
    • ProtonVPN
  • Secure Cloud Storage: Store and share files securely with end-to-end encryption and strict data ownership policies.
    • Tresorit
    • Sync.com
    • pCloud
  • Privacy-Focused Browsers: Protect user data by blocking trackers, ads, and other invasive technologies.
    • Brave Browser
    • Tor Browser
    • Firefox with privacy extensions
  • Ad and Tracker Blockers: Prevent websites from tracking users' activities and collecting data.
    • uBlock Origin
    • Privacy Badger
    • Ghostery
  • Data Monitoring and Control Tools: Help users monitor, manage, and control the data they share online.
    • MyPermissions (track apps accessing your data)
    • Jumbo Privacy (manage digital footprints)
    • DeleteMe (remove personal data from public databases)
  • File Sharing and Collaboration Tools with Privacy Share and collaborate on files securely without compromising data ownership
    • OnionShare
    • Nextcloud
  • Operating Systems and Software Focused on Privacy: Avoid traditional operating systems that collect telemetry data.
    • Tails OS (privacy-focused operating system)
    • Qubes OS (compartmentalized operating system)
  • Decentralized Identity Tools: Provide users control over their identity and personal data, reducing reliance on centralized platforms.
    • Microsoft Entra Verified ID
    • uPort
    • Sovrin Network

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

CIA Triad in Information Security
8 questions
Introduction to Information Security
40 questions
CIA Triad Overview
8 questions

CIA Triad Overview

CheerfulMagicRealism avatar
CheerfulMagicRealism
Use Quizgecko on...
Browser
Browser