100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D430 fundamentals of information security QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+ 2025/2026 $12.99   Add to cart

Exam (elaborations)

WGU D430 fundamentals of information security QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+ 2025/2026

 0 view  0 purchase
  • Course
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • Institution
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

WGU D430 fundamentals of information security QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+ 2025/2026

Preview 4 out of 32  pages

  • November 5, 2024
  • 32
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
avatar-seller
Ashley96
WGU D430 fundamentals of information
security


Information safety
protective facts, software program, and hardware comfortable in opposition to unauthorized get
admission to, use, disclosure, disruption, change, or destruction.


Compliance
The necessities that are set forth with the aid of laws and enterprise regulations.

IE: HIPPA/ HITECH- healthcare, PCI/DSS- fee card enterprise, FISMA- federal government
groups




DAD Triad
Disclosure, alteration, and denial




CIA Triad
The middle version of all records security standards. Confidential, integrity and availability


Confidential
Ability to protect our records from individuals who aren't authorized to view it.


What ways can confidentiality be compromised?
- lose a private computer with statistics
- Person can view your password you're coming into in
- Send an e-mail attachment to the incorrect individual.
- Attacker can penetrate your systems....And so on.


Integrity
Keeping information unaltered through accidental or malicious intent

,How to preserve integrity?
Prevent unauthorized adjustments to the statistics and the ability to reverse undesirable
authorized adjustments.

Via gadget/record permissions or Undo/Roll returned unwanted adjustments.


Availability
The ability to get admission to statistics whilst wished


Ways Availability can be compromised
- Power loss
- Application issues
- Network attacks
- System compromised (DoS)


Denial of Service (DoS)
Security trouble in which users are not able to get right of entry to an information system; may
be because of human mistakes, natural catastrophe, or malicious interest.


Parkerian hexad version
A model that adds three greater ideas to the CIA triad:

Possession/Control
Utility
Authenticity


Possession/ manipulate
Refers to the physical disposition of the media on which the facts is saved; This lets in you to
talk about loss of information through its physical medium.


Principle of Possession instance
Lost package deal (encrypted USB's and unencrypted USB's)

possession is an trouble due to the fact the tapes are bodily lost.

(Unencrypted is compromised via confidentiality and possession; encrypted is compromised
simplest through ownership).

,Principle of Authenticity
Allows you to mention whether you have attributed the information in query to the right
owner/creator.


Ways authenticity can be compromised
Sending an email but changing the message to appear to be it came from someone else, than
the authentic one that turned into sent.


Utility
How beneficial the facts is to you.

Ex. Unencrypted (plenty of utility) Encrypted (little utility).


Security Attacks
Broken down from the type of attack, risk the attack represents, and controls you would possibly
use to mitigate it.


Types of assaults
1- interception
2- interruption
three- modification
4- fabrication


Interception
Attacks lets in unauthorized customers to get entry to our information, applications, or
environments.

Primarily an assault against confidentiality




Interception Attack Examples
Unauthorized record viewing, copying, eavesdropping on phone conversations, studying a
person's emails.


Interruption

, Attacks reason our property to grow to be risky or unavailable for our use, on a brief or
permanent foundation.

This attack impacts availability however also can assault integrity




Interruption Attack Examples
DoS assault on a mail server; availability assault

Attacker manipulates the methods on which a database runs to save you get entry to; integrity
assault.

Could additionally be a combination of each.




Modification
Attacks contain tampering with our asset.

Such assaults would possibly in the main be considered an integrity attack, however may also
be an availability assault.


Modification Attack example
Accessing a report in a unauthorized manner and alter the statistics it carries; impacts the
integrity.

If the report in question is a config report that manages how a carrier behaves (internet server)
this may affect the supply.

If the config file changes how the server deals with encrypted connections; then its a
confidentiality attack.




Fabrication
Attacks involve producing records, methods, communications, or other comparable sports with a
gadget.

Attacks more often than not affect integrity but can be considered an availability attack.


Fabrication attack examples

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Ashley96. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart