
Module 5, Lesson 1.1
Presentation
•
Computers
•
7th - 12th Grade
•
Medium
Carissa Mulford
Used 1+ times
FREE Resource
26 Slides • 7 Questions
1
Module 5, Lesson 1.1
By Miranda Cauldwell
2
3
4
5
6
Multiple Choice
What is the CIA triad?
cyber, issues, alert
confidentiality, issues, alerts
confidentiality, integrity, availability
cyber, integrity, admin
7
8
Example- encrypting files
the focus on making sure data transmissions are kept private
Keeping information and communications private and protected from unauthorized access
Includes trade and military secrets, personnel, health, and tax records
Controlled via encryption, access control, and steganography
Confidentiality
9
the process of ensuring that the data sent is what arrives to the intended destination
Keeping organizational information accurate, free of errors, and free from unauthorized modification
Includes modification of test scores or other information stored on network servers
Controlled via hashing, digital signatures, certificates, and change control
Integrity
10
we have access to the data we need when we need it.
Ensuring that computer systems operate continuously and that authorized persons can access the data they need
Includes ensuring that vital data such as radar images are both captured and distributed to airports
Controlled via redundancy, fault tolerance, and patching
Availability
11
Multiple Choice
A part of the CIA triad, what is the process of ensuring that the data sent is what arrives to the intended destination
Confidentiality
Integrity
Availability
12
Multiple Choice
A part of the CIA triad, having access to the data we need when we need it.
Confidentiality
Integrity
Availability
13
Multiple Choice
A part of the CIA triad, what is the focus on making sure data transmissions are kept private
Confidentiality
Integrity
Availability
14
15
16
Confidentiality Concerns
this is any attempt to get access to information on a host or storage device (data at rest) that you are not authorized to view.
An attacker might steal a password or find an unlocked workstation with a logged-on user account, or they might install some sort of spyware on the host.
Snooping
17
•this is snooping on data or telephone conversations as they pass over the network.
It can be relatively easy for an attacker to "tap" a wired network or intercept unencrypted wireless transmissions.
Networks can use segmentation and encryption to protect data in-transit.
Eavesdropping/Wiretapping
18
•Snooping on traffic passing over a network is also often called sniffing.
Sniffing
19
•this means getting users to reveal information while acting like a trusted source
authority
intimidation
consensus
scarcity
familiarity
urgency
Social Engineering
20
Multiple Choice
a type of confidentiality concern that is based on a violation of trust
social engineering
sniffing
snooping
dumpster diving
21
Multiple Choice
Data at rest being viewed by someone without given access.
eavesdropping
snooping
sniffing
dumpster diving
22
Multiple Choice
Data in transit being viewed or heard over a network or where priviledges are not admitted.
eavesdropping
snooping
dumpster diving
23
24
25
26
27
28
29
30
31
32
fraudulent emails and websites
Phishing
phishing toward a specific user- typically a company executive- CEO
Spear-Phishing
Gain confidential info over the phone
Vishing
phishing attempts via SMS or text messages
Smishing
33
Module 5, Lesson 1.1
By Miranda Cauldwell
Show answer
Auto Play
Slide 1 / 33
SLIDE
Similar Resources on Wayground
28 questions
Pie charts
Presentation
•
5th - 12th Grade
28 questions
Live Classroom
Presentation
•
7th Grade - University
28 questions
Unit 103 The Principles of Animal care- Feeding P2
Presentation
•
KG - University
28 questions
PENGGUNAAN ALAT SCAN TOOLS- DIAGNOSIS SISTEM
Presentation
•
8th - 12th Grade
30 questions
ESB Domain 2 Lesson 2
Presentation
•
8th - 12th Grade
25 questions
Introduction to Project Management - Slides
Presentation
•
KG
23 questions
Solutions, Acids & Bases Mastery Check
Presentation
•
8th - 12th Grade
26 questions
Intro to DDD Session 1
Presentation
•
KG - University
Popular Resources on Wayground
10 questions
5.P.1.3 Distance/Time Graphs
Quiz
•
5th Grade
10 questions
Fire Drill
Quiz
•
2nd - 5th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
22 questions
School Wide Vocab Group 1 Master
Quiz
•
6th - 8th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade