CIA Triad Fundamentals
Core Security Concepts
Security Roles & Responsibilities
Standards, Policies & Procedures
Information Security Goals & Challenges
100

“The component of the CIA triad that ensures information cannot be altered by unauthorized parties.”

What is Integrity?

100

“This structured plan includes policies, procedures, and ongoing risk analysis.”

What is an Information Security Program?

100

“This person has ultimate responsibility for the security program and reporting to executives.”

Who is the Chief Information Security Officer (CISO)?

100

“High-level mandatory statements setting security goals are known as this.”

What are Security Policies?

100

“Balancing protection of IT assets while not hindering business performance is this.”

What is Security vs. Usability (or Availability)?

200

“The CIA principle concerned with making data available when needed.”

What is Availability?

200

“Identifying, assessing, and mitigating vulnerabilities is known as this.”

What is Risk Management?

200

“These individuals ensure that users follow policies and receive security training.”

Who are Security Administrators?

200

“These detailed, step-by-step guides explain how to perform security tasks.”

What are Procedures?

200

“This type of security control reduces the likelihood or impact of a threat.”

What is a Preventive Control?

300

This principle requires that only those with permission can read sensitive data.”

What is Confidentiality?

300

“This is any potential occurrence that might negatively impact organizational assets.”

What is a Threat?

300

“This role implements and manages security controls on technical systems.”

Who are System Administrators?

300

“This type of document contains specific guidelines or rules derived from policy.”

What are Standards?

300

“These are reactive measures taken after a security incident to limit damage.”

What are Corrective Controls?

400

A breach in this pillar can allow unauthorized data modification.”

What is a breach of Integrity?

400

“A weakness in a system or process that could be exploited is called this.”

What is a Vulnerability?

400

“Users who follow rules and attend awareness sessions hold this vital duty.”

What is User Accountability?

400

“Best practices that are recommended but not mandatory fall under this term.”

What are Guidelines?

400

“This challenge arises when security measures make systems hard to use.”

What is Resistance to Security (User Friction)?

500

“Ensuring data is accurate, complete, and reliable aligns with this concept.”

What is Integrity?

500

“The estimated effect on an organization if a particular risk occurs is referred to as this.”

What is Impact?

500

“This group sets the strategic direction and provides risk funding decisions.”

Who is the Executive Management/Board of Directors?

500

“This document communicates required and preferred system configurations.”

What is a Baseline?

500

“Working to comply with HIPAA or GDPR reflects tackling this aspect of security.”

What is Regulatory/Legal Compliance?

M
e
n
u