The Parkerian Hexad

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which one of the following best describes possession or control in the context of the Parkerian Hexad?

  • The unauthorized access of data, applications, or environments
  • The usefulness of data to the user
  • The ability to attribute data to the proper owner or creator
  • The physical disposition of the media on which the data is stored (correct)

What is the primary focus of interceptions in the context of attacks?

  • Confidentiality (correct)
  • Availability
  • Integrity
  • Utility

What is the main purpose of fabrication attacks?

  • Generating fake information in a database (correct)
  • Tampering with an asset
  • Making assets temporarily or permanently unusable
  • Moving data from one place to another

Which category of controls protects the physical environment in which systems and data are stored?

<p>Physical (B)</p> Signup and view all the answers

Which step in the risk management process involves assessing vulnerabilities in the context of potential threats?

<p>Assess Vulnerabilities (B)</p> Signup and view all the answers

Which term describes the conjunction of a threat and a vulnerability?

<p>Risk (A)</p> Signup and view all the answers

What is the first and arguably most important part of the risk management process?

<p>Identify Assets (C)</p> Signup and view all the answers

Which term refers to the physical disposition of the media on which the data is stored?

<p>Possession (B)</p> Signup and view all the answers

What is the primary focus of interceptions in the context of attacks?

<p>Confidentiality (B)</p> Signup and view all the answers

What is the main purpose of fabrication attacks?

<p>Generating fake information (A)</p> Signup and view all the answers

Which category of controls protects the systems, networks, and environments that process, transmit, and store data?

<p>Logical controls (D)</p> Signup and view all the answers

What is the purpose of identifying assets in the risk management process?

<p>To enumerate the critical assets (A)</p> Signup and view all the answers

What is the conjunction of a threat and a vulnerability called?

<p>Risk (B)</p> Signup and view all the answers

Which framework is often useful for discussing the nature of a given threat in the risk management process?

<p>CIA triad (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

The Jewish Community
10 questions
The Dreyfus Affair
8 questions
The Parkerian Hexad and CIA Triad Quiz
3 questions
Use Quizgecko on...
Browser
Browser