Computer Security Basics

RadiantJasper729 avatar
RadiantJasper729
·
·
Download

Start Quiz

Study Flashcards

15 Questions

Which method ensures that information is trustworthy and accurate?

Integrity

What are the three pillars on which Computer Security is built?

Confidentiality, Integrity, and Availability

What are some methods to ensure confidentiality?

Cryptography, Encryption, Physical or Virtual Isolation, Background Checks

What is a set of rules that limits access to information?

Confidentiality

What is the popularly known triad on which Computer Security is built?

CIA Triad

What are the three pillars on which Computer Security is built?

Confidentiality, Integrity, and Availability

Which method ensures that the information is trustworthy and accurate?

Integrity

What is a set of rules that limits access to information?

Confidentiality

Which type of security attack involves intercepting information?

Confidentiality

What are some methods to ensure confidentiality?

Cryptography, Encryption, Physical or Virtual Isolation

Which type of security attack involves altering information to make it untrustworthy?

Integrity attack

What is the term for the set of rules that limits access to information?

Confidentiality

Which method ensures that the information is trustworthy and accurate?

Integrity

What is the term for the assurance that the information is trustworthy and accurate?

Integrity

Which type of security attack involves tricking individuals into providing sensitive information?

Phishing

Study Notes

Information Trustworthiness

  • Validation ensures that information is trustworthy and accurate.
  • Scrutinizing sources and employing verification techniques enhance credibility.

Three Pillars of Computer Security

  • Confidentiality: Protecting information from unauthorized access.
  • Integrity: Safeguarding data against unauthorized modification or disruption.
  • Availability: Ensuring that authorized users can access information when needed.

Methods to Ensure Confidentiality

  • Encryption: Converts data into a coded format to prevent unauthorized access.
  • Access Controls: Implementing user permissions and authentication mechanisms to limit data access.

Access Control

  • Access control encompasses a set of rules that restrict information accessibility.
  • Policies define who can view or manipulate data within a system.

Security Triad

  • The commonly referred triad of computer security consists of Confidentiality, Integrity, and Availability.

Types of Security Attacks

  • Interception: Involves unauthorized access to information during transmission.
  • Alteration: Manipulating data to compromise its trustworthiness.
  • Phishing: Tricks individuals into disclosing sensitive information through deceptive communication.

Assurance of Information Accuracy

  • The assurance that information is trustworthy and accurate is known as data integrity.

Test your knowledge of computer security with this quiz on the basics of computer security in 2020. Learn about the goals, types, and measures of computer security, as well as the potential loss and recent data breaches.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

More Quizzes Like This

Use Quizgecko on...
Browser
Browser