Chapter 1 Flashcards
(75 cards)
What is cybersecurity?
The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
According to the U.S. Cybersecurity & Infrastructure Security Agency (CISA)
What does the CIA triad stand for?
Confidentiality, Integrity, Availability
What is the expected growth percentage of cybersecurity jobs between 2021 and 2023?
35%
What is the role of a Cybersecurity Architect (CSA)?
Helps shape, design, and plan the technical aspects of an organization’s approach to security at all levels
What are the three main topics covered in the introduction to cybersecurity?
- What is cybersecurity?
- Confidentiality/integrity/availability
- Networking and operating systems
True or False: The only secure computer system is one that is never turned on or used.
True
Define access control.
The procedure of permitting solely authorized individuals, programs, or other computer systems to observe, alter, or gain control over a computer system’s resources
What does secure software development encompass?
Procedures and tasks associated with the strategic planning, coding, and administration of software and systems to guarantee confidentiality, integrity, and availability
What is the goal of Business Continuity Planning/Disaster Recovery (BCP/DR)?
To uphold uninterrupted business operations in the face of significant disruptions
What is cryptography?
The science of using deception and mathematics to hide data from unwanted access
What is the purpose of information security governance and risk management?
To safeguard critical information assets and systems through holistic strategies
List the key responsibilities of security operations.
- Asset protection
- Monitoring and detection
- Incident response
- Ongoing maintenance
- Process integration
What does physical and environmental security involve?
Safeguarding facilities housing critical information systems against unauthorized access and environmental hazards
What is security architecture?
Translating organizational requirements into comprehensive cybersecurity designs encompassing people, processes, and technology controls
What is the main purpose of telecommunications/network security?
To ensure the confidentiality, integrity, and availability of data transmitted over networks
Fill in the blank: Cybersecurity is the mitigation of ______ to maintain confidentiality, integrity, and availability.
risk
What is the significance of governance frameworks in information security?
They provide guiding models for protection through integrated frameworks, policies, and standards
What are the components of legal/regulatory/compliance and investigations?
- Computer crime legislation
- Associated regulations
- Investigative measures
- Evidence gathering/management methodologies
- Reporting protocols
What does effective governance in cybersecurity require?
Going beyond technology to address human behavior, security awareness, and best practices
True or False: The growth of computers and web-based applications has only positive effects on society.
False
What is the typical breakdown of cybersecurity domains by ISC2?
- Access control
- Secure software development
- Business continuity planning/Disaster recovery (BCP/DR)
- Cryptography
- Information security governance/risk management
- Legal/regulatory/compliance and investigations
- Security operations
- Physical and environmental security
- Security architecture
- Telecommunications/network security
What is the CIA triad?
Confidentiality, Integrity, Availability
The CIA triad is a foundational concept in cybersecurity.
What does confidentiality refer to in cybersecurity?
Protecting information from unauthorized access
Confidentiality ensures that sensitive information is only accessible to authorized individuals.
What is integrity in the context of cybersecurity?
Reliability and completeness of data
Integrity ensures data has not been unintentionally modified or altered.