2. Fundamentals Of Security Flashcards

1
Q

Information Security

A

Protecting data and information from unauthorized access, modification, disclosure, and disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Protecting the systems that hold and process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad
Confidentiality

A

Ensure information is accessible only to authorized personnel.
e.g. encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Triad
Integrity

A

Ensure data remains accurate and unaltered.
e.g. checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA Triad
Availability

A

Ensure information and resources are accessible when needed.
e.g. redundancy measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudiation

A

Guarantees that an action or event cannot be denied by the involved parties.. e.g.. digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication

A

Verify the identity of a user or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authorization

A

Determining actions or resources an authenticated user can access.
e.g. permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accounting

A

Tracking user activities and resource usage for audit or billing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Control Categories

A

Technical
Managerial
Operational
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Control Types

A

Preventative
Deterrent
Detective
Corrective
Compensating
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero Trust Model

A

Operates on the principle that no one should be trusted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero Trust is achieved by:

A

Control Plane - Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Data Plane - Subject/system, policy engine, policy administrator and establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability

A

Any weakness in the system design or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk of the system is located

A

Where threats and vulnerabilities intersect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Management

A

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome

18
Q

3 reasons confidentiality is important

A

Protect personal privacy
Maintain a business advantage
Achieve regulatory compliance

19
Q

5 methods to ensure confidentiality

A

Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness

20
Q

3 reasons integrity is important

A

Ensure accuracy
Maintain Trust
Ensure system operability

21
Q

5 methods to maintain integrity:

A

Hashing
Digital Signatures
Checksums
Access Controls
Regular Audits

22
Q

3 reasons Availability is important

A

Ensures business continuity
Maintains customer trust
Upholds organizational reputation

23
Q

5 methods to maintain availability

A

Redundancy
Server Redundancy
Data Redundancy
Network Redundancy
Power Redundancy

24
Q

3 reasons non-repudiation is important

A

Confirm the authenticity of a digital transaction
Ensure the integrity of crucial communications
Provide accountability in digital processes

25
Q

5 common authentication methods

A

Something you Know (Knowledge)
Something you have (Posession)
Something you are (Inherence)
Something you do (Action)
Somewhere you are (Location)

26
Q

Accounting

A

A security measure that ensures all user activities during a communication or transaction are properly tracked and recorded.

27
Q

5 accounting methods

A

Audit trail
Maintain Regulatory Compliance
Conduct forensic Analysis
Perform resource optimization
Achieve user accountability

28
Q

Technical Controls

A

Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks

29
Q

Managerial Controls
(Administrative controls)

A

Involve the strategic planning and governance side of security

30
Q

Operational Controls

A

Procedures and measures that are designed to protect data on a
day-to-day basis

31
Q

Physical Controls

A

Tangible, real-world measures taken to protect assets

32
Q

Preventative Controls

A

Proactive measures implemented to thwart potential security threats or breaches

33
Q

Deterrent Controls

A

Discourage potential attackers by making the effort seem less appealing or more challenging

34
Q

Detective Controls

A

Monitor and alert organizations to malicious activities as they occur or shortly thereafter.

35
Q

Corrective Controls

A

Mitigate any potential damage and restore our systems to their normal state

36
Q

Compensating Controls

A

Alternative measures that are implemented when primary security
controls are not feasible or effective

37
Q

Directive Controls

A

Often rooted in policy or documentation and set the standards for
behavior within an organization

38
Q

Gap Analysis

A

Process of evaluating the differences between an organization’s current performance and its desired performance

39
Q

2 types of Gap Analysis

A

Technical Gap Analysis
Business Gap Analysis

40
Q

Zero Trust

A

Zero Trust demands verification for every device, user, and transaction within the network, regardless of its origin