Chapter 1 Flashcards

(75 cards)

1
Q

What is cybersecurity?

A

The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information

According to the U.S. Cybersecurity & Infrastructure Security Agency (CISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA triad stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the expected growth percentage of cybersecurity jobs between 2021 and 2023?

A

35%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of a Cybersecurity Architect (CSA)?

A

Helps shape, design, and plan the technical aspects of an organization’s approach to security at all levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three main topics covered in the introduction to cybersecurity?

A
  • What is cybersecurity?
  • Confidentiality/integrity/availability
  • Networking and operating systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: The only secure computer system is one that is never turned on or used.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define access control.

A

The procedure of permitting solely authorized individuals, programs, or other computer systems to observe, alter, or gain control over a computer system’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does secure software development encompass?

A

Procedures and tasks associated with the strategic planning, coding, and administration of software and systems to guarantee confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the goal of Business Continuity Planning/Disaster Recovery (BCP/DR)?

A

To uphold uninterrupted business operations in the face of significant disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cryptography?

A

The science of using deception and mathematics to hide data from unwanted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of information security governance and risk management?

A

To safeguard critical information assets and systems through holistic strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the key responsibilities of security operations.

A
  • Asset protection
  • Monitoring and detection
  • Incident response
  • Ongoing maintenance
  • Process integration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does physical and environmental security involve?

A

Safeguarding facilities housing critical information systems against unauthorized access and environmental hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is security architecture?

A

Translating organizational requirements into comprehensive cybersecurity designs encompassing people, processes, and technology controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main purpose of telecommunications/network security?

A

To ensure the confidentiality, integrity, and availability of data transmitted over networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: Cybersecurity is the mitigation of ______ to maintain confidentiality, integrity, and availability.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the significance of governance frameworks in information security?

A

They provide guiding models for protection through integrated frameworks, policies, and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the components of legal/regulatory/compliance and investigations?

A
  • Computer crime legislation
  • Associated regulations
  • Investigative measures
  • Evidence gathering/management methodologies
  • Reporting protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does effective governance in cybersecurity require?

A

Going beyond technology to address human behavior, security awareness, and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False: The growth of computers and web-based applications has only positive effects on society.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the typical breakdown of cybersecurity domains by ISC2?

A
  • Access control
  • Secure software development
  • Business continuity planning/Disaster recovery (BCP/DR)
  • Cryptography
  • Information security governance/risk management
  • Legal/regulatory/compliance and investigations
  • Security operations
  • Physical and environmental security
  • Security architecture
  • Telecommunications/network security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the CIA triad?

A

Confidentiality, Integrity, Availability

The CIA triad is a foundational concept in cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does confidentiality refer to in cybersecurity?

A

Protecting information from unauthorized access

Confidentiality ensures that sensitive information is only accessible to authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is integrity in the context of cybersecurity?

A

Reliability and completeness of data

Integrity ensures data has not been unintentionally modified or altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Define availability in cybersecurity.
Continuous accessibility and optimal functioning of data and systems ## Footnote Availability ensures minimal disruptions or downtime for users.
26
Which aspect of cybersecurity ensures actions cannot be denied?
Non-repudiation ## Footnote Non-repudiation provides evidence that a specific action took place.
27
What is data encryption?
Converting plaintext into coded form (ciphertext) ## Footnote Encryption prevents unauthorized access to data content.
28
What are access controls?
Mechanisms to restrict access based on user roles ## Footnote Access controls help prevent unauthorized individuals from accessing confidential data.
29
What is data validation?
Verifying the accuracy and consistency of data ## Footnote Data validation ensures data meets predefined criteria.
30
What are hash functions?
Mathematical algorithms generating unique hash values for data ## Footnote Hash functions help detect integrity violations by comparing hash values.
31
What does disaster recovery planning involve?
Creating strategies to recover systems and data after disruptions ## Footnote This includes regular backups and documented restoration procedures.
32
What are Distributed Denial of Service (DDoS) attacks?
Attacks that overwhelm systems causing service unavailability ## Footnote DDoS attacks can be mitigated through traffic filtering and CDNs.
33
What is the purpose of digital certificates?
Validate the identity of individuals or entities in transactions ## Footnote Digital certificates are issued by trusted third parties.
34
What are audit trails?
Records capturing activities and events within a system ## Footnote Audit trails provide evidence of actions performed in a system.
35
True or False: The CIA triad components are interconnected.
True ## Footnote Understanding the relationships between confidentiality, integrity, and availability is vital.
36
What are Local Area Networks (LANs)?
Networks connecting devices within a limited geographical area ## Footnote LANs are commonly used in homes and offices.
37
What is the function of routers in networking?
Direct data packets between different networks ## Footnote Routers play a critical role in managing network traffic.
38
What is the principle of least privilege?
Users have only the necessary privileges to perform tasks ## Footnote This principle reduces the risk of unauthorized access.
39
What is network segmentation?
Dividing a network into smaller, isolated segments ## Footnote Network segmentation limits the impact of potential breaches.
40
What is the Untrusted Zone (UTZ)?
The lowest level of trust within a network, typically internet-facing ## Footnote Traffic from the UTZ is usually restricted from entering other zones.
41
What does the Trusted Zone (TZ) represent?
The highest level of trust within a network ## Footnote TZs are assumed to be secure and trustworthy.
42
Fill in the blank: The _______ Zone (RZ) contains the most sensitive data and databases.
Restricted ## Footnote The RZ is characterized by stringent access controls.
43
What is perimeter defense in cybersecurity?
Security measures at the network's edge against external threats ## Footnote This includes firewalls and intrusion detection systems.
44
What are secure protocols?
Protocols ensuring encrypted communication to prevent eavesdropping ## Footnote Examples include HTTPS.
45
What is the role of antivirus software in operating systems?
Detect and remove malicious programs ## Footnote Antivirus solutions protect against various forms of malware.
46
What is the purpose of intrusion detection systems (IDSs) and intrusion prevention systems (IPSs)?
They monitor and filter network traffic ## Footnote IDSs detect potential threats, while IPSs actively prevent them.
47
What does HTTPS stand for and what is its significance?
Hypertext Transfer Protocol Secure; it ensures encrypted communication between clients and servers ## Footnote This prevents eavesdropping and data tampering.
48
What is the principle of least privilege?
Users have only the necessary privileges to perform their tasks ## Footnote This reduces the risk of unauthorized access.
49
What does endpoint security focus on?
Securing individual devices connected to the network ## Footnote It includes measures like antivirus software and host-based firewalls.
50
What are the fundamental components of cybersecurity?
Networking and operating systems ## Footnote Understanding these enables comprehension of secure communication.
51
What are the types of applications?
Desktop applications, mobile applications, web applications, and enterprise applications ## Footnote Each type has unique characteristics and security considerations.
52
What is application security?
It is vital in protecting sensitive information and ensuring reliable application functioning ## Footnote It prevents unauthorized access and data breaches.
53
What is input validation?
Properly validating and sanitizing user inputs to prevent attacks ## Footnote This includes protection against SQL injection and cross-site scripting (XSS).
54
What role does governance play in GRC?
It guides overall management and decision-making within an organization ## Footnote Good governance ensures ethical and transparent operations.
55
What do regulations refer to in the context of GRC?
Rules and guidelines established by governmental bodies or industry regulators ## Footnote Compliance with these is crucial for avoiding penalties.
56
What is compliance in GRC?
Adherence to laws, regulations, internal policies, and industry standards ## Footnote It involves processes to ensure operations align with requirements.
57
What are common application security challenges?
Input validation, authentication and authorization, secure coding practices, secure configuration, and patch management ## Footnote Addressing these challenges is essential for resilient applications.
58
What is the CIA triad?
Confidentiality, Integrity, and Availability ## Footnote These are crucial aspects of protecting sensitive information.
59
What is the secure development life cycle (SDL)?
An approach to ensure application security throughout its development phases ## Footnote It includes requirements, design, development, testing, deployment, and maintenance.
60
Fill in the blank: Governance, regulations, and _______ (GRC) is a framework for ethical conduct and risk mitigation.
Compliance
61
True or False: Organizations can ignore regulations if they have strong internal policies.
False ## Footnote Organizations must comply with external regulations regardless of internal policies.
62
What is the significance of maintaining trust in application security?
Secure applications build trust among users, customers, and stakeholders ## Footnote This leads to increased adoption and customer satisfaction.
63
What is the importance of application security in today's digital landscape?
Protects sensitive data, prevents exploits, and maintains user trust ## Footnote Essential for safeguarding against threats and vulnerabilities.
64
What are some key aspects related to applications?
Types of applications, application development, and common application platforms ## Footnote Each aspect has unique security considerations.
65
What is the primary focus of the book 'Mastering Windows Security and Hardening'?
Secure and protect your Windows environment from cyber threats using zero-trust security principles
66
What is the second edition of 'Mastering Windows Security and Hardening' about?
It covers securing and protecting Windows environments from cyber threats using zero-trust security principles
67
What does the book 'Network Security Principles and Practices' focus on?
Fundamental principles and practices of network security
68
What is included in the 'Computer Security Handbook, Set (Volume 1 and 2) 6th Edition'?
Comprehensive coverage of computer security topics
69
What is the purpose of the 'CISSP All-in-One Exam Guide, Ninth Edition'?
Preparation for the CISSP certification exam
70
Fill in the blank: 'Mastering Windows Security and Hardening' employs _______ security principles.
[zero-trust]
71
True or False: 'Network Security Principles and Practices' is a book focused solely on theoretical aspects of network security.
False
72
What are the two volumes of the 'Computer Security Handbook' designed to provide?
A comprehensive overview of computer security topics
73
What certification does the 'CISSP All-in-One Exam Guide' help prepare for?
CISSP certification
74
What is a key theme in the book 'Mastering Windows Security and Hardening'?
Utilizing zero-trust security principles
75
List two books that focus on network security.
* Network Security Principles and Practices * Mastering Windows Security and Hardening