16-A Flashcards
(52 cards)
What is information security?
The practice of controlling access to data in any format, including computer data and paper records
Information security aims to ensure confidentiality, integrity, and availability (CIA triad) of the data.
Define the CIA triad in information security.
Confidentiality, Integrity, Availability
These are the three core properties that secure information should maintain.
What does confidentiality mean in the context of information security?
Certain information should only be known to certain people.
What is the meaning of integrity in information security?
Data is stored and transferred as intended, and any modification is authorized.
Explain availability in information security.
Information is accessible to those authorized to view or modify it.
How does cybersecurity differ from information security?
Cybersecurity specifically refers to controls that protect against attacks on computer storage and processing systems.
What is a vulnerability?
A weakness that could be accidentally triggered or intentionally exploited to cause a security breach.
Define a threat in the context of security.
The potential for someone or something to exploit a vulnerability and breach security.
What is risk in information security?
The likelihood and impact of a threat actor exercising a vulnerability.
What is a configuration baseline?
A set of recommendations for deploying a computer in a hardened configuration to minimize vulnerabilities.
What does the term ‘non-compliant system’ refer to?
A system that has drifted from its hardened configuration.
What is an unprotected system?
A system missing or improperly configuring at least one technical security control.
Define a software vulnerability.
A fault in design or code that can cause an application security system to be circumvented or cause the application to crash.
What is a zero-day vulnerability?
A vulnerability that is exploited before the developer knows about it or can release a patch.
What are unpatched systems?
Systems that have not been updated with OS and application patches.
What does BYOD stand for?
Bring Your Own Device.
What is social engineering?
Techniques that persuade or intimidate people into revealing confidential information.
Explain the concept of impersonation in social engineering.
Developing a pretext scenario to interact with an employee and gain their trust.
What is dumpster diving?
Combing through an organization’s garbage to find useful documents for an attack.
What is shoulder surfing?
Learning a password or PIN by watching the user type it.
Define tailgating in the context of security.
Entering a secure area without authorization by following someone who has access.
What is phishing?
Using social engineering techniques to make spoofed electronic communications seem authentic.
What distinguishes spear phishing from regular phishing?
Spear phishing targets specific individuals with personalized information to increase effectiveness.
What is whaling in cybersecurity?
An attack directed specifically against upper levels of management.