Domain 1: Security and Risk Management - Fundamental Principles of Security - Integrity
7 important questions on Domain 1: Security and Risk Management - Fundamental Principles of Security - Integrity
When will integrity be maintained?
How can an attacker compromise the integrity of systems or data?
1. Virus
2. Logic Bomb
3. Backdoor
into a system
In what ways can the integrity of a system or data being compromised by different attacks?
2. Malicious modification
3. Replacement of data with incorrect data
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What instrument you can use to combat threats like corruption, malicious modification or the replacement of data with incorrect data?
2. Intrusion detection
3. Hashing
How does most users usually affect a systems data integrity?
Name examples of users compromising integrity by accident.
2. User inserts incorrect values into data-processing application, now customer is being charged 3000 euro instead of 30 euro.
3. Incorrectly modifying data
How can security prevent the compomise of integrity?
2. System critical file should be restricted from viewing and access by users
3. Applications should check for reasonable input values.
4. Databases should only authorize certain individuals to modify data
5. Data in transit should be encrypted
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding