The Parkerian Hexad
14 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which one of the following best describes possession or control in the context of the Parkerian Hexad?

  • The unauthorized access of data, applications, or environments
  • The usefulness of data to the user
  • The ability to attribute data to the proper owner or creator
  • The physical disposition of the media on which the data is stored (correct)
  • What is the primary focus of interceptions in the context of attacks?

  • Confidentiality (correct)
  • Availability
  • Integrity
  • Utility
  • What is the main purpose of fabrication attacks?

  • Generating fake information in a database (correct)
  • Tampering with an asset
  • Making assets temporarily or permanently unusable
  • Moving data from one place to another
  • Which category of controls protects the physical environment in which systems and data are stored?

    <p>Physical</p> Signup and view all the answers

    Which step in the risk management process involves assessing vulnerabilities in the context of potential threats?

    <p>Assess Vulnerabilities</p> Signup and view all the answers

    Which term describes the conjunction of a threat and a vulnerability?

    <p>Risk</p> Signup and view all the answers

    What is the first and arguably most important part of the risk management process?

    <p>Identify Assets</p> Signup and view all the answers

    Which term refers to the physical disposition of the media on which the data is stored?

    <p>Possession</p> Signup and view all the answers

    What is the primary focus of interceptions in the context of attacks?

    <p>Confidentiality</p> Signup and view all the answers

    What is the main purpose of fabrication attacks?

    <p>Generating fake information</p> Signup and view all the answers

    Which category of controls protects the systems, networks, and environments that process, transmit, and store data?

    <p>Logical controls</p> Signup and view all the answers

    What is the purpose of identifying assets in the risk management process?

    <p>To enumerate the critical assets</p> Signup and view all the answers

    What is the conjunction of a threat and a vulnerability called?

    <p>Risk</p> Signup and view all the answers

    Which framework is often useful for discussing the nature of a given threat in the risk management process?

    <p>CIA triad</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser