Chapter 1 Flashcards

Today's Security Professionals

1
Q

Confidentiality (C.I.A)

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity (C.I.A)

A

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability (C.I.A)

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nonrepudiation

A

Someone who performed some action, such as sending a message, cannot later deny having taken that action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disclosure

A

The exposure of sensitive information to unauthorized individuals. Also known as Data Loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Exfiltration

A

When attackers gain access to info and remove it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Alteration

A

The unauthorized modification of information. This is a violation of the principal of integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial

A

The disruption of an authorized user’s legitimate access to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Control Categories

A

Measures implemented to protect systems, data, and infrastructure from threats. Three main types:

  1. Technical Controls
  2. Administrative Controls
  3. Physical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technical Controls

A

Enforce CIA in the digital space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Administrative Controls

A

These are policies, procedures, and guidelines established to manage security. Examples include security awareness training, access control policies, and incident response protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical Controls

A

Security controls that impact the physical world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operational Controls

A

The processes that we put in place to manage technology in a secure manner.

Ex: Access reviews, log monitoring, and vulnerability management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Managerial Controls

A

Procedural mechanisms that focus on the mechanics of the risk management process. Implemented through processes like awareness, training, and oversight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Control Types

A

Security controls can be categorized based on their purpose and function. Here are the main types:
1. Preventive Controls
2. Detective Controls
3. Corrective Controls
4. Deterrent Controls
5. Compensating Controls
6. Recovery Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Preventive Controls

A

It intends to stop a security issue before it occurs.

Ex: Firewall, Encryption

17
Q

Detective Controls

A

Identifies security events that have already occurred.

Ex: Intrusion detection systems

18
Q

Compensating Controls

A

Controls designed to mitigate risk associated with exceptions made to a security policy.

Ex: Something temporary while solving a problem that has occurred. Generator, block instead of patch, separation duties

19
Q

Directive Controls

A

inform employees and others what they should do to achieve security objectives.

20
Q

Deterrent Controls

A

Seek to prevent an attacker from attempting to violate security policies.

Ex: Guard dogs, barbed wire fences, signs(DO NOT ENTER)

21
Q

Corrective Controls

A

Remediate security issues that have already occurred.

Ex: Restoring back-ups after ransomware attacks.

22
Q

Data Obfuscation

A

Transforming data into a format, where the original information can’t be retrieved.

Ex: Hashing, Tokenization, Masking

23
Q

Masking

A

Partially redacts sensitive information by replacing some or all sensitive fields with blank characters.

Ex: xxx - xx - 1236

24
Q

Tokenization

A

This replaces sensitive values with a unique identifier using a lookup table.

Ex: Replacing student ID with a 10 digit number maintained in a lookup table.

25
Hashing
Uses a hash function to transform a value in our dataset to a corresponding hash value.
26
Deidentification
A process that removes the ability to link data to an individual, reducing sensitivity.
27
Rainbow Table Attack
The attacker computes the hashes of those candidate values and then checks to see if those hashes exit in our data file. -When someone has a list of possible values for a field.
28
Compliance Risk
When a security breach causes an organization to run afoul of legal or regulatory requirements.
29
Data Minimization
Techniques that seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.
30
Strategic Risk
The risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.
31
Security Incidents
When an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
32
Data Loss Prevention (DLP)
Any systems that identify, monitor, and protect data to prevent it from unauthorized use, modification, destruction, egress or exfiltration from a location.
33
Control Objectives
The requirements of the level of protection required to preserve the CIA of an organizations information and systems.