2.0a Security Principles Flashcards

Basic Security Principles (30 cards)

1
Q

Confidentiality

A

Ensuring sensitive data is only accessible to authorized individuals or entities and protected from unauthorized disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Maintaining the accuracy, consistency, and trustworthiness of data and information throughout it’s lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Ensuring information and resources are accessible and usable by authorized users when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

Verifying the identity of users, systems, or divices to ensure they are who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

Granting appropriate access rights and privileges to authorized users based on their roles and responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudiation

A

Ensuring the origin and receipt of information or transactions can be verified and parties cannot deny their involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defense in Depth

A

Implementing multiple layers of security controls to protect against various types of cyber threats and attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Least Privilege

A

Providing users with the minimum level of access necessary to perform their tasks, reducing the risk of unauthorized access or misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Separation of Duties

A

Assigning different tasks and responsibilities to different individuals to prevent any single person from having complete control over critical processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Auditability and Accountability

A

Keeping track of security events and actions, enabling traceability and accountability in case of security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defense in Breadth

A

Extending security controls across various layers and components of an IT system to provide comprehensive protection against diverse cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy

A

Ensuring the protection of individuals’ personal and sensitive information from unauthorized access or disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security by Design

A

Integrating security measures and considerations from the early stages of system design and development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incident Response

A

Having a well-designed and practiced plan to respond to security incidents promptly and effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Patch Management

A

Regularly applying security patches and updates to software and systems to address known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption

A

Using Cryptographic techniques to protect data from unauthorized access or tampering.

17
Q

Physical Security

A

Implementing measures to safeguard physical assets, such as servers, data centers, and devices, from theft or damage.

18
Q

Monitoring and Logging

A

Collecting and analyzing security logs and events to detect and respond to suspicious activities or breaches.

19
Q

Redundancy and Resilience

A

Building redundancy and resilience into critical systems to ensure continuity of operations in the face of disruptions

20
Q

User Education

A

Conducting cybersecurity awareness training for employees and users to promote safe online practices and reduce human-related security risks.

21
Q

Secure Software Development

A

Integrating secure coding practices and conduction regular security assessments during software development to minimize vulnerabilities

22
Q

Insider Threat Mitigation

A

Implementing measures to detect and prevent malicious activities from insiders, such as employees, contractors, or partners.

23
Q

Least Common Mechanism

A

Reducing the shared access to resources or data among users and applications to limit the potential impact of security breaches.

24
Q

Mobile Device Security

A

Implementing security measures to protect mobile devices such as smartphones and tablets, and the sensitive data they store or access.

25
Clout Security
Applying security controls and best practices to secure data and applications hosted in cloud environments.
26
Secure Remote Access
Implementing secure remote access solutions for employees and authorized users to connect to internal resources securely.
27
Identity and Access Management (IAM)
Controlling and managing user access to systems and resources bases on their roles and permissions.
28
Cyber Threat Hunting
Proactively searching for signs of cyber threats and intrusions within an organization's network and systems.
29
Disaster Recovery Planning (DRP)
Developing plans and procedures to recover IT systems and operations in case of a significant cybersecurity incident or disaster.
30
Social Media Security
Education users about safe practices on social media platforms to prevent information leaks and social engineering attacks.