Defense in Depth Flashcards

1
Q

Which component of the CIA triad refers to assurance that information can be read and interpreted only by persons and processes explicitly authorized to do so.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which component of the CIA triad refers to the assurance that information remains intact, correct, and authentic.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which component of the CIA triad refers to assurance that authorized users can access and work with information
assets, resources, and systems when needed, with sufficient response and performance.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____________ * _______________ = Risk

A

Threat * Vulnerability = Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different threat categories?

A

Environmental: fire, flood, power outage
External: terrorists, organized crime, hackers, etc.
Internal: disgruntled employees, agents, errors
Structured: well organized planned, methodical attacks
Unstructured: random attacks with limited resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Potential for threat-source to exploit vulnerability

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Flaw that can present a security breach

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Defense-in-Depth approach treats all systems as equally important?

A

Uniform Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Defense-in-Depth approach subdivides and separates networks using VLANs, VPNs, Host-Based Firewalls and Internal Network Firewalls?

A

Protected Enclaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Defense-in-Depth approach prioritizes protection of information over systems and creates successive layers of protection between the information and the attacker

A

Information Centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Defense-in-Depth approach IDs various vectors of threats and provides security mechanisms to prevent the use of the vector? This requires figuring out how to place controls on the vectors to prevent the threat from crossing the vulnerability.

A

Vector Oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly