2. Fundamentals Of Security Flashcards

1
Q

Information Security

A

Protecting data and information from unauthorized access, modification, disclosure, and disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Protecting the systems that hold and process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad
Confidentiality

A

Ensure information is accessible only to authorized personnel.
e.g. encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Triad
Integrity

A

Ensure data remains accurate and unaltered.
e.g. checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA Triad
Availability

A

Ensure information and resources are accessible when needed.
e.g. redundancy measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudiation

A

Guarantees that an action or event cannot be denied by the involved parties.. e.g.. digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication

A

Verify the identity of a user or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authorization

A

Determining actions or resources an authenticated user can access.
e.g. permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accounting

A

Tracking user activities and resource usage for audit or billing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Control Categories

A

Technical
Managerial
Operational
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Control Types

A

Preventative
Deterrent
Detective
Corrective
Compensating
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero Trust Model

A

Operates on the principle that no one should be trusted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero Trust is achieved by:

A

Control Plane - Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Data Plane - Subject/system, policy engine, policy administrator and establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability

A

Any weakness in the system design or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk of the system is located

A

Where threats and vulnerabilities intersect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Management

A

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome

18
Q

3 reasons confidentiality is important

A

Protect personal privacy
Maintain a business advantage
Achieve regulatory compliance

19
Q

5 methods to ensure confidentiality

A

Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness

20
Q

3 reasons integrity is important

A

Ensure accuracy
Maintain Trust
Ensure system operability

21
Q

5 methods to maintain integrity:

A

Hashing
Digital Signatures
Checksums
Access Controls
Regular Audits

22
Q

3 reasons Availability is important

A

Ensures business continuity
Maintains customer trust
Upholds organizational reputation

23
Q

5 methods to maintain availability

A

Redundancy
Server Redundancy
Data Redundancy
Network Redundancy
Power Redundancy

24
Q

3 reasons non-repudiation is important

A

Confirm the authenticity of a digital transaction
Ensure the integrity of crucial communications
Provide accountability in digital processes

25
5 common authentication methods
Something you Know (Knowledge) Something you have (Posession) Something you are (Inherence) Something you do (Action) Somewhere you are (Location)
26
Accounting
A security measure that ensures all user activities during a communication or transaction are properly tracked and recorded.
27
5 accounting methods
Audit trail Maintain Regulatory Compliance Conduct forensic Analysis Perform resource optimization Achieve user accountability
28
Technical Controls
Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks
29
Managerial Controls (Administrative controls)
Involve the strategic planning and governance side of security
30
Operational Controls
Procedures and measures that are designed to protect data on a day-to-day basis
31
Physical Controls
Tangible, real-world measures taken to protect assets
32
Preventative Controls
Proactive measures implemented to thwart potential security threats or breaches
33
Deterrent Controls
Discourage potential attackers by making the effort seem less appealing or more challenging
34
Detective Controls
Monitor and alert organizations to malicious activities as they occur or shortly thereafter.
35
Corrective Controls
Mitigate any potential damage and restore our systems to their normal state
36
Compensating Controls
Alternative measures that are implemented when primary security controls are not feasible or effective
37
Directive Controls
Often rooted in policy or documentation and set the standards for behavior within an organization
38
Gap Analysis
Process of evaluating the differences between an organization's current performance and its desired performance
39
2 types of Gap Analysis
Technical Gap Analysis Business Gap Analysis
40
Zero Trust
Zero Trust demands verification for every device, user, and transaction within the network, regardless of its origin