Chapter 1 Flashcards

Today's Security Professionals (33 cards)

1
Q

Confidentiality (C.I.A)

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity (C.I.A)

A

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability (C.I.A)

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nonrepudiation

A

Someone who performed some action, such as sending a message, cannot later deny having taken that action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disclosure

A

The exposure of sensitive information to unauthorized individuals. Also known as Data Loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Exfiltration

A

When attackers gain access to info and remove it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Alteration

A

The unauthorized modification of information. This is a violation of the principal of integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial

A

The disruption of an authorized user’s legitimate access to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Control Categories

A

Measures implemented to protect systems, data, and infrastructure from threats. Four main types:

  1. Technical Controls
  2. Operational Controls
  3. Managerial Controls
  4. Physical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technical Controls

Security Control Categories

A

Enforce CIA in the digital space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operational Controls

Security Control Categories

A

The processes that we put in place to manage technology in a secure manner.

Ex: Access reviews, log monitoring, and vulnerability management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Managerial Controls

Security Control Categories

A

Policies and procedures that guide security decisions and ensure compliance. They focus on governance, risk management, and oversight. Examples include security policies, risk assessments, and audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Controls

Security Control Categories

A

Security controls that impact the physical world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Administrative Controls

Subset of Managerial Controls

A

These are policies, procedures, and guidelines established to manage security. Examples include security awareness training, access control policies, and incident response protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Control Types

A

Security controls can be categorized based on their purpose and function. Here are the main types:
1. Preventive Controls
2. Detective Controls
3. Corrective Controls
4. Deterrent Controls
5. Compensating Controls
6. Recovery Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Preventive Controls

A

It intends to stop a security issue before it occurs.

Ex: Firewall, Encryption

17
Q

Detective Controls

A

Identifies security events that have already occurred.

Ex: Intrusion detection systems

18
Q

Compensating Controls

A

Controls designed to mitigate risk associated with exceptions made to a security policy.

Ex: Something temporary while solving a problem that has occurred. Generator, block instead of patch, separation duties

19
Q

Directive Controls

A

inform employees and others what they should do to achieve security objectives.

20
Q

Deterrent Controls

A

Seek to prevent an attacker from attempting to violate security policies.

Ex: Guard dogs, barbed wire fences, signs(DO NOT ENTER)

21
Q

Corrective Controls

A

Remediate security issues that have already occurred.

Ex: Restoring back-ups after ransomware attacks.

22
Q

Data Obfuscation

A

Transforming data into a format, where the original information can’t be retrieved.

Ex: Hashing, Tokenization, Masking

23
Q

Masking

A

Partially redacts sensitive information by replacing some or all sensitive fields with blank characters.

Ex: xxx - xx - 1236

24
Q

Tokenization

A

This replaces sensitive values with a unique identifier using a lookup table.

Ex: Replacing student ID with a 10 digit number maintained in a lookup table.

25
Hashing
Uses a hash function to transform a value in our dataset to a corresponding hash value.
26
Deidentification
A process that removes the ability to link data to an individual, reducing sensitivity.
27
Rainbow Table Attack
The attacker computes the hashes of those candidate values and then checks to see if those hashes exit in our data file. -When someone has a list of possible values for a field.
28
Compliance Risk
When a security breach causes an organization to run afoul of legal or regulatory requirements.
29
Data Minimization
Techniques that seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.
30
Strategic Risk
The risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.
31
Security Incidents
When an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
32
Data Loss Prevention (DLP)
Any systems that identify, monitor, and protect data to prevent it from unauthorized use, modification, destruction, egress or exfiltration from a location.
33
Control Objectives
Defines the level of Confidentiality, Integrity, and Availability (CIA) required to protect an organization’s information and systems. These objectives help guide security policies and measures based on risks, threats, and business needs.