Search Header Logo
Security 1.1

Security 1.1

Assessment

Presentation

Computers

9th - 12th Grade

Practice Problem

Easy

Created by

Sarah Hess

Used 2+ times

FREE Resource

13 Slides • 13 Questions

1

Network Security
1 - Defense in Depth

2

media
  • Core framework for information security

  • Three essential pillars:

    • Confidentiality

    • Integrity

    • Availability

  • Guides organizational security policies and practices

CIA TRIAD

3

Multiple Choice

What does CIA stand for in cybersecurity?

1
Confidentiality, Integrity, Availability
2
Confidentiality, Identity, Accountability
3
Control, Integrity, Access
4
Confidentiality, Integrity, Authentication

4

Multiple Choice

The CIA Triangle is primarily used for:

1
Financial analysis
2
Military strategy
3

Information security

4
Public relations

5

media
  • Restricts access to authorized users only

  • Protected through:

    • Authentication systems (MFA)

    • Encryption methods

    • Access permissions (Least Privledge)

  • MFA: What you have, what you know, what you are

  • Businesses use labeling like privileged, top-secret, internal use only

Confidentiality

6

Multiple Choice

Which is NOT a method of maintaining confidentiality?

1
Using secure communication channels
2
Implementing data encryption
3

Public posting online

4
Restricting access to sensitive information

7

Multiple Choice

Confidentiality protects against:

1

Unauthorized access

2

Data corruption

3

System crashes

4

Power outages

8

media

-Ensures that data remains accurate and unaltered during storage or transfer.
-Can be maintained through auditing and encryption.
-Digital signatures and headers are used to ensure integrity

Integrity

9

Multiple Choice

What is an example of failed integrity in the CIA triad?

1
Unauthorized modification of data in a financial report.
2
Access controls to limit user permissions.
3
Regular backups of data to prevent loss.
4
Data encryption to protect sensitive information.

10

media

-Data is available when needed
-Possible threats
-Cyber Attacks
-Natural Disasters
-Hardware Failure
-Techniques: Redundancy, fault tolerance, backups

Availability

11

Multiple Choice

What is not a threat to data availability?

1
Natural disasters affecting server locations
2
Data corruption due to malware
3
Regular maintenance and updates of systems
4
Power outages disrupting service

12

Multiple Choice

Which of the following enhances availability?

1
Regular backups only
2
Single point of failure
3
Manual intervention for recovery
4

Fault tolerance

13

media

Repudiation: Rejection of an event of idea

Non-repudiation: to prove that someone did something even if they say they didn't

-Authenticaton
-Logging
-Security cameras

Non-repudiation

14

Multiple Choice

What is non-repudiation?

1

A security measure that prevents an entity from denying the authenticity of their actions.

2
A process that allows users to change their previous actions.
3
A technique for encrypting data during transmission.
4
A method to verify the identity of a user.

15

media
  • Any potential danger to information or systems

  • Examples: Malware, phishing, insider threats

Threats

16

media
  • Any potential danger to information or systems

  • Examples: Malware, phishing, insider threats, 0 day attacks

Vulnerability

17

media
  • Likelihood that a threat will exploit a vulnerability

  • Risk = Threat × Vulnerability × Impact

  • Register can include category, probability, impact, threshold, cost,

    and contingency plan

  • Risk includes cost, scope and time

  • Contingency plans in case of reality

Risk

18

Multiple Choice

A threat can be defined as:

1
A guaranteed outcome of a successful incident.
2
A strategy to eliminate all possible dangers.
3
A measure of security against potential risks.
4

A potential cause of an security incident.

19

Multiple Choice

A vulnerability is:

1
An upgrade to improve software functionality.
2
A method to secure data from unauthorized access.
3
A feature that enhances system performance.
4
A weakness in a system that can be exploited.

20

Multiple Choice

What formula represents risk?

1

Risk = Exposure - Control x Vulnerability

2
Risk = Threat x Vulnerability
3

Risk = Cost + Time x Impact

4

Risk = Threat x Vulnerability x Impact

21

media
  • Limiting user access to only what is necessary

  • Reduces risk and attack surface

Principle of Least Privilege

22

media
  • The sum of all points where an attacker can try to enter a system

  • Includes IoT devices, software interfaces

Attack Surface

23

media
  • IoT devices often lack robust security measures

  • Key risks: Lack of updates, default credentials

IoT

24

Multiple Choice

What is PoLP?

1
Principle of Maximum Privilege
2

Principle of Least Privilege

3
Policy of Least Access
4
Protocol of Least Permission

25

Multiple Choice

Which of the following can increase attack surfaces?

1

Monitoring network traffic

2

Adding IoT devices

3

Using encryption

4

Limiting user privileges

26

media

“Why are we able to trust ATM machines?”

Write a paragraph to explain why we can trust ATM machines that support the following points:

  • Confidentiality.

  • Integrity.

  • Availability.

CIA in your life...

Network Security
1 - Defense in Depth

Show answer

Auto Play

Slide 1 / 26

SLIDE