The Cube Challenge
1/8
1/23
This material was developed with funding from the
National Science Foundation under Grant # DUE 1601612
Back
Next
Restart
Information
Security
Properties
McCumber Cube Review
Security Measures
All elements of information security management tie back to the McCumber Cube. Test your knowledge by correctly classifying each security action based on the three dimensions of the cube.
2/23
Information States
SUBMIT
Transmission
Storage
Processing
Policy and Procedures
Technology
Confidentiality
Awareness, Training, Education
Integrity
Availability
Element
with Audio
HTML
Click Next to continue
Challenge 1
Code that replaces password characters with asterisks when users log in (character masking)
3/23
Choose the correct element for each dimension and click SUBMIT
Challenge 11
An organization’s video demonstrates the use of an app to implement hard drive encryption on all company tablets
13/23
Button
Point Total:
0
Challenge 3
Smart phone that uses face recognition for logging in to access apps
5/23
Challenge 5
Video showing employees how to use VPN client from remote location to access patient records
7/23
21/23
Challenge 19
IPsec
10/23
Challenge 8
Steps followed by vendor using an iPad when customer buys an antique at a flea market using a credit card
Challenge 9
Training users on record locking technologies
11/23
14/23
Challenge 12
Data validation of credit card number during purchase
Challenge 4
Two members of a medical team must approve electronic prescription of highly controlled medication for an at-risk patient
6/23
Challenge 16
Intrusion prevention system stops unauthorized modification of configuration file
18/23
Challenge 6
Handbook on implementing TKIP
8/23
Challenge 13
Using ESP in the implementation of IPsec to prevent a man-in-the-middle attack
15/23
Challenge 2
Company mandate requiring all mobile devices upgrade from TKIP to CCMP
4/23
Challenge 7
Incident response guide dealing with DDoS against Cloud-based transactions
9/23
12/23
Challenge 10
Limiting the number of connection requests that fail to complete a three-way-handshake for an online ordering system
Challenge 14
Signage detailing when and where users can access data on SAN system
16/23
17/23
Challenge 15
Online store uses HTTPS for customer purchases
19/23
Challenge 17
Corporate procedures that establish user-access rules for files stored in the cloud
Challenge 18
Stateful firewall
20/23
22/23
Challenge 20
Internal directive to define mandatory access control list
You completed the quiz.
23/23
of 60