ADVERTISEMENT
ADVERTISEMENT

Home » Cyber Security

Goals of Cyber Security

Goals of Cyber Security: In this article, we are going to learn about the important goals of Cyber Security.
Submitted by Vanka Manikanth, on March 17, 2020

This section is to provide a deep understanding of the foundation of security with the well-known triad CIA, hey it's not a Central Intelligence Agency, this CIA referred to as Confidentiality, Integrity, and anonymity. To avoid confusion, we can refer to it as the AIC triad.

The CIA triad is the most common principle to assess, select and implement the proper security controls to reduce risk.

1) Confidentiality

Making sure that your sensitive information is accessible to authorized users and ensuring no data is disclosed to unintended ones. For example, your password is confidential and shall not be shared who might exploit it which eventually hampers Confidentiality.

Methods to ensure Confidentiality:

  1. Data encryption
  2. Two or Multifactor authentication
  3. Verifying Biometrics

2) Integrity

Ensuring all your data is accurate; reliable and it must not be altered in the transmission from one point to another.

Methods to ensure Integrity:

  1. No unauthorized shall have access to delete the files, which breaches confidentiality also. So, there shall be User Access Controls.
  2. Proper backups must be available to restore immediately.
  3. Version controlling must be there to check the log who has modified.

3) Availability

Whenever the user has requested a resource for a piece of information there shall not be any attack warnings such as Denial of Service (DoS). All the information has to be available. For example, a website is under the hands of hackers resulting in the DoS so there hampers the availability.

Methods to ensure Availability:

  1. Spare equipment like firewalls, proxy servers on the downtime which can guard.
  2. Storing backup at a geographically isolated location.
  3. Having a DR plan, Disaster recovery plan.

Multiple choices questions & answers


2) DoS attack comes under
  1. Integrity
  2. Man in the middle attack
  3. Availability breach

3) Data encryption methodology comes under?
  1. Integrity
  2. DoS attack
  3. Confidentiality

4) A and B are having a business chat and C has been in the middle and just changing the responses from both and sending his required data which principle is hampering here
  1. Confidentiality
  2. Integrity
  3. Authorization

5) Assume that your Instagram has got into hacker's hands and posted some objectionable content but you were unable to log in as they changed your password all security questions to recover your account. Which of the following principles the attack can be considered?
  1. Confidentiality
  2. Integrity
  3. Confidentiality, Integrity, and Availability

6) ________means your password cannot be accessible by unauthorised users
  1. Confidentiality
  2. Integrity
  3. Authenticity

7) Employee sensitive information has been leaked through a flaw existing in an application by an Ex-Employee.
  1. Personal data is an asset
  2. Ex-Employee is an Asset
  3. By medium used by hacker is an asset

8) Flooding lots of traffic to an application by a threat agent and an application cannot be accessible comes under which principle.
  1. Availability
  2. Integrity
  3. Request Handling


10) Authentication means
  1. Provided accessible permission
  2. Set of rules to validate the given credentials
  3. None of the Above

ADVERTISEMENT




ADVERTISEMENT


Comments and Discussions!

ADVERTISEMENT

ADVERTISEMENT

ADVERTISEMENT

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT

Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates

© https://www.includehelp.com some rights reserved.