Search Header Logo
Module 5, Lesson 1.1

Module 5, Lesson 1.1

Assessment

Presentation

Computers

7th - 12th Grade

Medium

Created by

Carissa Mulford

Used 1+ times

FREE Resource

26 Slides • 7 Questions

1

Module 5, Lesson 1.1

By Miranda Cauldwell

2

media

3

media

4

5

media

6

Multiple Choice

What is the CIA triad?

1

cyber, issues, alert

2

confidentiality, issues, alerts

3

confidentiality, integrity, availability

4

cyber, integrity, admin

7

media

8

media

​Example- encrypting files

  • the focus on making sure data transmissions are kept private

  • Keeping information and communications private and protected from unauthorized access

  • Includes trade and military secrets, personnel, health, and tax records

  • Controlled via encryption, access control, and steganography

Confidentiality

9

media

  • ​the process of ensuring that the data sent is what arrives to the intended destination

  • Keeping organizational information accurate, free of errors, and free from unauthorized modification

  • Includes modification of test scores or other information stored on network servers

  • Controlled via hashing, digital signatures, certificates, and change control

Integrity

10

media

  • we have access to the data we need when we need it.

  • Ensuring that computer systems operate continuously and that authorized persons can access the data they need

  • Includes ensuring that vital data such as radar images are both captured and distributed to airports

  • Controlled via redundancy, fault tolerance, and patching

Availability

11

Multiple Choice

A part of the CIA triad, what is ​the process of ensuring that the data sent is what arrives to the intended destination

1

Confidentiality

2

Integrity

3

Availability

12

Multiple Choice

A part of the CIA triad, having access to the data we need when we need it.

1

Confidentiality

2

Integrity

3

Availability

13

Multiple Choice

A part of the CIA triad, what is the focus on making sure data transmissions are kept private

1

Confidentiality

2

Integrity

3

Availability

14

media

15

media

16

media

  • Confidentiality Concerns

  • this is any attempt to get access to information on a host or storage device (data at rest) that you are not authorized to view.

  • An attacker might steal a password or find an unlocked workstation with a logged-on user account, or they might install some sort of spyware on the host.

Snooping

17

media

this is snooping on data or telephone conversations as they pass over the network.

  • It can be relatively easy for an attacker to "tap" a wired network or intercept unencrypted wireless transmissions.

  • Networks can use segmentation and encryption to protect data in-transit.

Eavesdropping/Wiretapping

18

media

Snooping on traffic passing over a network is also often called sniffing.

Sniffing

19

media

this means getting users to reveal information while acting like a trusted source

  • ​ authority

  • intimidation

  • consensus

  • scarcity

  • familiarity

  • urgency​

Social Engineering

20

Multiple Choice

a type of confidentiality concern that is based on a violation of trust

1

social engineering

2

sniffing

3

snooping

4

dumpster diving

21

Multiple Choice

Data at rest being viewed by someone without given access.

1

eavesdropping

2

snooping

3

sniffing

4

dumpster diving

22

Multiple Choice

Data in transit being viewed or heard over a network or where priviledges are not admitted.

1

eavesdropping

2

snooping

3

dumpster diving

23

media

24

media

25

media

26

media

27

media

28

media

29

media

30

media

31

media

32

media
media
media
media

fraudulent emails and websites

Phishing

phishing toward a specific user- typically a company executive- CEO

​​Spear-Phishing

Gain confidential info over the phone

​​Vishing

phishing attempts via SMS or text messages

​​Smishing

33

media

Module 5, Lesson 1.1

By Miranda Cauldwell

Show answer

Auto Play

Slide 1 / 33

SLIDE