block 8 information protection Flashcards

1
Q

three components of the CIA TRIAD

A
  • Confidentiality
  • Integrity
  • Availability
  • focuses on data protection from IT Security standpoint (ITsec)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A
  • ensuring information is
    accessible only to those authorized to have access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is data in use?

A

-data actively changing.

  • application layer of the OSI model.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Data-in-motion?

A
  • AKA data-in-transit
  • data traversing a network, the internet, etc.
  • data in flight = wireless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is data at rest?

A

data must not currently be in
use or moving point-to-point.
(ex. files, folders, drives, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is integrity?

A

(AKA data authenticity) data not altered in an unauthorized manner from point of origin to delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is hashing?

A
  • mathematical formula to data
  • binary form
  • taking a virtual snapshot of the data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is availability?

A
  • assures that systems work when needed, resources are accessible at all times, and authorized users are not denied services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does the AAA model focus on?

A

-maintains CIA triad via access control

  • focuses on controlling access to info + data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is identification?

A

system to prove individual identity

  • Ex. usernames, passwords, CACs, digital tokens, key fobs, and biometrics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is authentication?

A
  • verifies identification factors

(Ex. CAC card pin)
cac card is identification
pin = authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is authorization?

A

system applies permissions to a user’s account after logging in to said system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is accounting?

A

deals with logging activity so that different departments can be held responsible for their usage of the different services, user and device activity can be tracked and create a chain of custody-type of management workflow, and ensure non-repudiation occurs properly.

  • Accounting is done
    with various logging events such as system logs, security logs, and application logs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is non-repudiation?

A

recipient proof of actions (receipts), so neither can later deny having processed the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the 2 acts that grant exceptions to entities?

A
  • USA patriot ACT 2001
  • reduce restriction laws to detect and suppress terrorism.
  • Electronic Communication Privacy Act (ECPA) of 1986
    reduce criminal penalties when unauthorized access to the electronic communication is not for a
    tortious or illegal purpose or private commercial gain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the 2 acts that propose penalties on those who abuse systems and resources?

A
  • Sarbanes Oxley Act (SOX) of 2002
    “The Act contains provisions affecting corporate governance, risk management, auditing,
    and financial reporting of public companies, including provisions intended to deter and punish corporate
    accounting fraud and corruption.”

SOX- fined up to $5,000,000 and
receive 20 years in prison.

  • Health Insurance Portability and Accountability Act (HIPAA) of 1996
  • protect personal health information (PHI) from being disclosed without their consent or knowledge

Violating HIPAA can lead to 10 years in prison and a $250,000 fine

17
Q

what is a policy?

A

“plan embracing goals and acceptable procedures especially of a governmental body

18
Q

what is a procedure?

A

series of actions done in a certain way or order

19
Q

what is principle of least privilege (PoLP)?

A
  • should only have the necessary privileges to complete their tasks
20
Q

what are security policies?

A
  • define objectives/constraints for security program
21
Q

what is awareness?

A

NIST SP 800-50 = Awareness is not training.

goal = focus attention on security.

Awareness presentations allow individuals to recognize IT security concerns and respond accordingly. (done by SAT)

22
Q

what is security awareness training (SAT)?

A
  • entire user population
    consists of
    1) TRAINING
  • personnel to cover the importance of securing information

2) INFORMING
- users of their roles in daily IT security responsibilities, as documented in agency
security policy and procedures

3) STEPS
-personnel need to take to help ward off attacks

23
Q

what is user agreement?

A

must agree to certain conditions before they may have access.

  • contain acceptable use policy (AUP)
    classification of information, and Personally Identifiable Information (PII).
24
Q

what is user accountability?

A

NIST SP 800-16

  • individual accountability should be one of your organization’s prime security objectives and derived from a fully informed, well-trained, and aware workforce.
    hopes of less disruptions or compromises by accountability
25
Q

what is risk assessment?

A

process of testing security controls to discover a system’s strengths and
weaknesses/vulnerabilities.

26
Q

what is risk acceptance?

A

that you understand and accept the risk as-is.

27
Q

what is risk avoidance?

A

you decide not to perform that activity anymore in order to avoid the risk.

28
Q

what is risk mitigation?

A

taking steps to reduce the probability of occurrence of a particular risk.

  • incorporates threat and vulnerability analysis, and considers mitigations provided by security controls planned or in place.
29
Q

what is risk transference?

A

you share the risk with another entity since you can never fully remove risk from the picture.

30
Q

what is an event?

A

Any observable occurrence in a network or system and appears suspicious
tracked by monitoring devices like
IDS + IPS

31
Q

what is an incident?

A

An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system

  • aka scanning attacks, compromise, malicious code attacks, denial of service attacks, and loss or
    theft.