CIA Triad
Classifications
Risk Management
Laws, Laws, Laws
Asset Protection
100

Name the 3 tenets of the CIA Triad

What are Confidentiality, Integrity, and Availability

100

This is the highest level of classification for the government.

What is Top Secret?

100

This is the process of identifying, analyzing, and responding to potential threats that could impact an organization's assets.

What is Risk Management?

100

GDRP revised in 2016 stands for this

What is (EU) General Data Protection Regulation

100

These are the two kinds of cryptosystems

What are Symmetric and Asymmetric?

200

This principle of the CIA Triad ensures that authorized users can access data when needed.

What is Availability?

200

This process assigns a security label to data based on its sensitivity and impact level. 

What is Data Classification?

200

This type of risk response involves taking no action and accepting the potential impact.

What is Risk Acceptance?

200

PCI stands for this

What is the payment card industry (data security standard)?

200

This security measure ensures that only authorized personnel can enter a restricted area using badges, biometrics, or PIN codes.

What is Access Control?

300

This CIA Triad principle ensures data remains accurate and unaltered.

What is integrity?

300

This principle ensures that users only have access to the data necessary for their job role.

What is the Principle of Least Privilege?

300

This risk management strategy involves transferring the impact of a risk to a third party, such as through insurance.

What is Risk Transfer?

300

GLBA of 1999 stand for this

What is the Gramm-Leach-Bliley Act?

300

This security measure prevents unauthorized physical access to critical infrastructure, such as data centers and server rooms.

What is Physical Security?

400

This type of attack violates the confidentiality principle by exposing sensitive information to unauthorized users.

What is a Data Breach?

400

This type of data classification is commonly used in the private sector to protect proprietary business information.

What is Confidential?

400

Identifies resources that are critical to our company and its ongoing viability.

What is Business Impact Assessment (BIA)?

400

FISMA stands for this

What is the Federal Information Security Management Act?

400

Solve (ROT1): GDZKSG

What is HEALTH?

500

This type of cyberattack targets the availability principle by overwhelming a system or network with excessive traffic

What is a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack?

500

When an asset no longers warrants or needs its current classification.

What is declassification?

500

Denying that a risk exists and hoping that it'll never be realized.

What is Risk Rejection?

500

HIPAA Stands for this.

What is the Health Insurance Portability and Accountability Act?

500

This data protection method ensures that stored data remains unreadable without proper decryption keys.

What is Encryption?

M
e
n
u