Chapter 01 - Todays Security Professional Flashcards

(54 cards)

1
Q

What is Confidentiality

A

Confidentiality ensures that unauthorized individuals are not able to gain access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 3 cyber security objectives.

A

CIA:
* Confidentiality
* Integrity
* Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Ensures that there is no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability

A

Ensures that info and systems are rready to meet the needs of legimitate users at the time those users request it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name some confidentiality security controls.

A
  • Firewalls
  • Access Control Lists
  • Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some Integrity controls.

A
  • Hashing
  • Integrity Monitoring Solutions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name some availability controls.

A
  • Fault tolerance
  • Clustering
  • Backups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________ occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.

A

Security Incidents occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the DAD triad

A

Disclosure
Alteration
Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ model explains the three key threats to cyber security efforts.

A

DAD triad model explains the three key threats to cyber security efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss.

A

Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is the unauthorized modification of information and is a violation of the principle of integrity.

A

Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ is the unintended disruption of an authorized users legitimate access to information.

A

Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attackers who gain access to sensitive information and remote it from the organization are said to be performing _______.

A

Data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

We can categorize the potential impact of a security incident using the same categories that businesses generally use to describe any type of risk. The categories are ____, _____, _____, _____ and _____.

A

Financial, Reputational, Strategic, Operational, and Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

________ is the risk of monetary damage to the organization as the result of the data breach.

A

Financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

______ risk occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.

A

Reputational risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

________ is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

A

Strategic Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____ is risk to the organization’s ability to carry out its day-to-day functions. This may slow down business processes, delay delivery of customer orders, or require the implementation of time-consuming manual work-arounds to normally automated practices.

A

Operational Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ occurs when a security breach causes an organization to run afoul of legal or regulatory requirements.

A

Compliance Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

______ requires that health-care providers and other covered entities protect the confidentiality, integrity and availability of protected health information (PHI).

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HIPAA is an example of a ______ risk.

23
Q

Losing a laptop with new product development plans fits under _______ risk.

A

Strategic Risk

24
Q

Name the three security control categories.

A

Technical, Operational and Managerial Controls.

25
______ enforce confidentiality, integrity and availability in the digital space. Examples include firewall rules.
Technical Controls
26
_____ include the processes that we put in place to manage technology in a secure manner.
Operational controls
27
______ are procedural mechanisms that focus on the mechanics of the risk management process.
Managerial controls
28
What security control is the following: Firewall, Intrusion prevention system, encryption, and access control lists.
Technical Controls
29
What security control is the following: Access Reviews, Log monitoring, and vulnerability management.
Operational Controls
30
What security control is the following: "Periodic risk assessments, security planning exercises, and the incorporation of security into the organization's change management, service acquisition, and project management practices. "
Managerial controls
31
____ controls intend to stop a security issue before it occurs.
Preventive Controls
32
___ controls identify security events that have already occurred. Example: Intrusion detection system.
Detective Controls
33
____ controls remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example.
Corrective Controls
34
____ controls seek to prevent an attacker from attempting to violating security policies.
Deterrent Controls
35
_____ controls are security controls that impact the physical world.
Physical controls
36
___ controls are controls designed to mitigate the risk associated with exceptions made to a security policy.
Compensating controls
37
Payment Card Industry Data Security Standard (PCI DSS) includes one of the most formal _______ control processes in use today.
Payment Card Industry Data Security Standard (PCI DSS) includes one of the most formal **compensating** control processes in use today.
38
Intrusion detection systems are ____ controls.
Detective Controls
39
Firewalls and encryption are _____ controls.
Preventive
40
Vicious guard dogs, barbed wire fences are an example of ______ control. (Not a physical control)
Deterrent control
41
Name the three states where data might exists:
1. Data in Motion 2. Data at Rest 3. Data in processing
42
_______ technology uses mathematical algorithms to protect information from prying eyes, both while it is in transit over a network and while it resides on systems.
Encryption
43
_________ systems help organizations enforce information handling policies and procedures to prevent data loss and theft.
Data Loss Prevention (DLP)
44
______ systems uses software agents installed on systems that search systems for the presence of sensitive information.
Host based DLP
45
______ systems are dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information.
Network-based DLP systems
46
DLP systems detect sensitive information using two methods: _________ and/or _______.
pattern maching and/or digital watermarking
47
________ techniques seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.
Data minimization
48
The best way to achieve data minimization is through _______.
Destroying data
49
________ process removes the ability to link data back to an individual, reducing its sensitivity.
De-identification
50
An alternative to de-identifying data is transforming it into a format where the orginal information can't be retrieved. This process is called _______.
Data Obfuscation
51
Name 3 tools that can assist with data obfuscation.
Hashing, Tokenization, and Masking
52
____ uses a function to transform a value in our dataset to a corresponding hash value.
Hashing
53
____ replaces sensitive values with a unique identifier using a lookup table.
Tokenization
54
_____ partially redacts sensitive information by replacing some or all sensitive fields with blank characters.
Masking