15 Questions
Which method ensures that information is trustworthy and accurate?
Integrity
What are the three pillars on which Computer Security is built?
Confidentiality, Integrity, and Availability
What are some methods to ensure confidentiality?
Cryptography, Encryption, Physical or Virtual Isolation, Background Checks
What is a set of rules that limits access to information?
Confidentiality
What is the popularly known triad on which Computer Security is built?
CIA Triad
What are the three pillars on which Computer Security is built?
Confidentiality, Integrity, and Availability
Which method ensures that the information is trustworthy and accurate?
Integrity
What is a set of rules that limits access to information?
Confidentiality
Which type of security attack involves intercepting information?
Confidentiality
What are some methods to ensure confidentiality?
Cryptography, Encryption, Physical or Virtual Isolation
Which type of security attack involves altering information to make it untrustworthy?
Integrity attack
What is the term for the set of rules that limits access to information?
Confidentiality
Which method ensures that the information is trustworthy and accurate?
Integrity
What is the term for the assurance that the information is trustworthy and accurate?
Integrity
Which type of security attack involves tricking individuals into providing sensitive information?
Phishing
Study Notes
Information Trustworthiness
- Validation ensures that information is trustworthy and accurate.
- Scrutinizing sources and employing verification techniques enhance credibility.
Three Pillars of Computer Security
- Confidentiality: Protecting information from unauthorized access.
- Integrity: Safeguarding data against unauthorized modification or disruption.
- Availability: Ensuring that authorized users can access information when needed.
Methods to Ensure Confidentiality
- Encryption: Converts data into a coded format to prevent unauthorized access.
- Access Controls: Implementing user permissions and authentication mechanisms to limit data access.
Access Control
- Access control encompasses a set of rules that restrict information accessibility.
- Policies define who can view or manipulate data within a system.
Security Triad
- The commonly referred triad of computer security consists of Confidentiality, Integrity, and Availability.
Types of Security Attacks
- Interception: Involves unauthorized access to information during transmission.
- Alteration: Manipulating data to compromise its trustworthiness.
- Phishing: Tricks individuals into disclosing sensitive information through deceptive communication.
Assurance of Information Accuracy
- The assurance that information is trustworthy and accurate is known as data integrity.
Test your knowledge of computer security with this quiz on the basics of computer security in 2020. Learn about the goals, types, and measures of computer security, as well as the potential loss and recent data breaches.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.