Security Principles Flashcards

CC Domain 1, including the foundational concepts of cybersecurity.

1
Q

Confidentiality

A

is the secrecy of the information within the asset being protected. Confidentiality is the most common form of protection that cyber criminals seek to compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access controls

A

are processes, tools, or configuration settings that ensure that access to data is restricted to only those individuals who are authorized to access it.

Access controls are mechanisms to ensure that only those persons or resources who are specifically authorized to access an information resource are allowed to have such access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography

A

makes data unreadable except to authorized persons and protects the confidentiality of data while the data is at rest (in storage) or while it is being transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

data is not being altered or corrupted in any way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hashes

A

which is a technique to detect if the contents of a data file or any data set have been altered from their original source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

vailability attacks are commonly known as denial of
service (DoS) attacks,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat actors

A

are cyber criminals who seek to compromise the confidentiality, integrity, oravailability of these information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

is the method by which systems verify that a user who is
requesting access to a resource really is who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nonrepudiation

A

guarantee that a sender of a message cannot later deny that they sent the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information assurance

A

refers to the measure of information security goal of information assurance is to verify and ensure the confidentiality, integrity, and availability of data and assets, and this can only be done by
measuring the effectiveness of security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Conduct Research

A

The first step the cyber criminal performs in an attack is to gather as much information as possible about the target to be able to carry out the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify Targets

A

During this phase the attacker tries to identify the organization’s
information assets as well as their corresponding vulnerabilities that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exploit Targets

A

Once the targets are identified, the attacker can design and execute the attack. This involves probing and taking advantage of specific
vulnerabilities with the goal of gaining unauthorized access to the
enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Do Bad Things

A

Once the attacker gains access, they can do a variety of things to achieve their objective. Usually, the attacker attempts to expand access laterally throughout the network to explore and discover more systems and data to gain deeper access and perform more attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Management

A

is the term used to describe the discipline of how an organization chooses and implements the right level of security that is appropriate for them and their situation or business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk Identification

A

identify the potential threats the organization may face and document in risk ledger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

threat modeling

A

process of examining each asset, the potential threats faced by each asset, and the adverse effects caused by the threat against the asset.

18
Q

Risk Management Tiers

A

Organizational tier Addresses risk by defining and implementing
a holistic risk management program that applies to the entire
organization
* Mission/business process Addresses the risks of major functions
of the business
* Information system Addresses the risks of specific information
systems

19
Q

Transfer risk

A

make it somebody else’s problem (risk
transference). The most common form of risk transference is to buy
insurance. Outsource the risk

20
Q

Accept the risk

A

means that as long as the risk is within
acceptable levels, the organization can “live with” the risk and take
their chances (risk acceptance)

risk appetite

21
Q

Avoid the risk

A

stopping the related activity or shutting down a system entirely (risk avoidance)

The most common example of
this is shutting down services or software applications that have
known flaws or vulnerabilities.

22
Q

Mitigate

A

reduce the risk by putting in some kind of control or
countermeasure (risk mitigation) ->fix

23
Q

Risk Tolerance

A

Level of variation(tolerance)

24
Q

Risk Priorities

A

identify risk -> risk ledger
access damage

25
Q

Governance

A

process of defining strategies to oversee the entire
organization or a specific subset (such as IT governance, security
governance, or financial governance) to meet organizational goals and objectives.

26
Q

Regulations and Laws

A

Laws and regulations are rules typically established by a governmental body or similar agency that specify requirements that are legally enforceable.

SOX, HIPAA, FISMA & GDPR

27
Q

Standards

A

documents developed and published by external standards organizations containing best practices that may be used for the development of security program elements.

ISO, NIST, PCI SSC, IEEE, IETF, CSA & OWASP

28
Q

Plans

A

can be written for all kinds of things such as a vulnerability management plan, business continuity plan, or incident response plan.

29
Q

Policies

A

high-level management statements providing prescriptive directives to the organization.

30
Q

Procedures

A

step-by-step workflows or instructions that define how a task should be accomplished.

31
Q

Defense-in-Depth

A

the concept of coordinating and leveraging multiple layers of controls to increase the effort required for a potential attacker to succeed in their nefarious activity.

32
Q

Administrative Controls

A

are management oriented controls that provide directives and
instruction aimed at people within the organization.

33
Q

Technical controls

A

are hardware or software components that protect computing and network resources such as computers, servers, mobile devices, computer networks, or data stored within a system.

34
Q

Physical controls

A

are tangible controls put in place to protect physical resources against physical threats, including but not limited to break-ins, fires, theft, physical harm, and so on.

35
Q

Preventive controls

A

provide functionality that prevents or stops an adverse event or incident.
ex. Administrative (background checks, hiring and termination
processes, etc.)
* Technical (network intrusion prevention system, firewall, MFA,
antivirus, etc.)
* Physical (fences, door locks, gates, etc.)

36
Q

Detective controls

A

provide functionality that helps to discover, detect, or identify when something bad might have occurred, such as an adverse activity, event, intruder, or incident.

ex. Administrative (mandatory vacation, review of access logs, etc.)
* Technical (a system that detects unusual activity on an organization’s
network)
* Physical (surveillance cameras, closed-circuit television [CCTV],
motion sensor, etc.)

37
Q

Deterrent controls

A

provide functionality that deters or discourages a potential adversary from performing an attack or engaging in unwanted behavior.

38
Q

Corrective controls

A

provide functionality that fixes a system, process, or activity after an adverse event has occurred.

ex. Administrative (e.g., terminating an employee after an offense or
implementing business continuity, disaster recovery, or incident
response plans)
* Technical (e.g., antivirus that quarantines malicious software,
restoring a system from backup)
* Physical (e.g., using a fire extinguisher to put out a fire, removing
datacenter badge access for a lost access card)

39
Q

Directive controls

A

provide functionality that serves to communicate expected behavior.
Common examples in day-to-day life might include traffic signs that communicate expected traffic behavior such as “stop,” “yield,” and so on. Directive controls are generally administrative in nature such as policies, standards, procedures, training, and so on.

40
Q

Compensating controls

A

serve as an alternate control to a primary control, often used when the primary control is not feasible to implement due to cost, complexity, or other organizational constraints.

ex. Administrative A small organization has a single employee accepting
cash payments, recording deposits, and reconciling financial reports.
The company may not have enough staff to fully implement
separation of duties, so instead, they implement a process where
leadership performs a regular review of reconciliation for additional
oversight.
* Technical An organization is running a critical application that relies
on old software that the manufacturer no longer releases security
updates for. Migrating to a new application may not be feasible, so an
organization may decide to implement network isolation of the
application as a compensating control.
* Physical An organization determines that a full-time security guard
for their office is too expensive, so instead they install fences, locks,
and alarms as compensating controls.