1) What is Info Sec? Flashcards

(66 cards)

1
Q

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

A

information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality, integrity, or availability?

A PIN code is required to log into an information asset.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality, integrity, or availability?

Permissions are implemented to ensure access is restricted.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality, integrity, or availability?

All systems are operational and accessible.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality, integrity, or availability?

Information is being protected by role-based access.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality, integrity, or availability?

Data have not been modified from the original creation.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ability to prevent data from being changed in an unauthorized manner.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ability to protect data from those who are not authorized to view it.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ability to access data when it is needed.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proper attribution to the owner or creator of the data.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical disposition of the media on which data is stored.

A

Posession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How useful the data is.

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attack Type:

Eavesdropping on a phone.

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack Type:

DoS on a mail server.

A

Interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attack Type:

Altering a web server config file.

A

Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack Type:

Spoofing emails.

A

Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Something that has potential to cause harm.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Weaknesses that can be used to harm us.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Likeliness that something bad will happen.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The value of the asset is used to assess if a risk is present.

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identifying and categorizing the assets we are trying to protect.

A

Identify Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Begin to identify and categorize threats that could harm our assets.

A

Identify Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Identify the weakness that exist in our assets.

A

Assess Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Assess if both a threat and a vulnerability exist.

A

Assess Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Put controls in place.
Mitigate Risks
26
What type of control should be used to mitigate the risk: Server room access.
Physical
27
What type of control should be used to mitigate the risk: Work hour restrictions not set.
Logical
28
What type of control should be used to mitigate the risk: No acceptable use form for users.
Administrative
29
What type of control should be used to mitigate the risk: Unguarded building.
Physical
30
What type of control should be used to mitigate the risk: Password lockout not set.
Logical
31
(T/F) Using the concept of defense in depth we can protect ourselves against someone using a USB flash drive to remove confidential data from an office space within our building.
True
32
Protects information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Security
33
Companies that process credit card payments must comply with this set of standards.
PCI DSS
34
Companies that process credit card payments must comply with PCI DSS. What does PCI DSS stand for?
Payment Card Industry Data Security Standard
35
Used to keep something private or minimally known.
Confidentiality
36
Refers to the ability to prevent our data from being changed in an unauthorized or undesirable manner.
Integrity
37
Refers to the ability to access our data when we need it.
Availability
38
A type of attack, primarily against confidentiality.
Interception
39
Something that has the potential to cause harm to our assets.
Threat
40
A weakness that can be used to harm us.
Vulnerability
41
The likelihood that something bad will happen.
Risk
42
An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis.
Interruption attack
43
An attack that involves tampering with our assets.
Modification attack
44
A model that adds three more principles to the CIA triad: possession or control, utility, and authenticity.
Parkerian hexad
45
The physical disposition of the media on which the data is stored.
Possession or control
46
Allows for attribution as to the owner or creator of the data in question.
Authenticity
47
Refers to how useful the data is to us.
Utility
48
An attack that involves generating data, processes, communications, or other similar activities with a system.
Fabrication attack
49
One of the first and most important steps of the risk management process.
Identify assets
50
A multilayered defense that will allow us to achieve a successful defense should one or more of our defensive measures fail.
Defense in depth
51
Based on rules, laws, policies, procedures, guidelines, and other items that are "paper" in nature.
Administrative controls
52
Sometimes called technical controls, these protect the systems, networks, and environments that process, transmit, and store our data.
Logical controls
53
Controls that protect the physical environment in which our systems sit, or where our data is stored.
Physical controls
54
Involves putting measures in place to help ensure that a given type of threat is accounted for.
Mitigating Risk
55
The risk management phase that consists of all of the activities that we can perform in advance of the incident itself, in order to better enable us to handle it.
Preparation phase
56
The risk management phase where we detect the occurrence of an issue and decide whether it is actually an incident so that we can respond to it appropriately.
Detection and analysis phase
57
The risk management phase where we determine specifically what happened, why it happened, and what we can do to keep it from happening again.
Post-incident activity phase
58
To completely remove the effects of the issue from our environment.
Eradication
59
Taking steps to ensure that the situation does not cause any more damage that it already has, or at the very least, lessen any ongoing harm.
Containment
60
Restore to a better state.
Recover
61
The Interception attack type most commonly affects which principle(s) of the CIA triad?
Confidentiality
62
The Fabrication attack type most commonly affects which principle(s) of the CIA triad?
Integrity and Availability
63
What is the first and arguably one of the most important steps of the risk management process?
Identify assets
64
Something that has the potential to cause harm to our assets.
Threat
65
During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again?
Post-incident Activity
66
Controls that protect the systems, networks, and environments that process, transmit, and store our data.
Logical controls