Chapter 1 Flashcards
(47 cards)
What are the main objectives of security controls?
Prevent security events, minimise impact, and limit the damage.
What are the four categories of security controls?
Technical, Managerial, Operational, and Physical Controls.
What is the CIA Triad in cybersecurity?
Confidentiality, Integrity, and Availability.
How is confidentiality maintained?
Encryption, access controls, two-factor authentication.
What mechanisms support integrity?
Hashing, digital signatures, certificates, non-repudiation.
How is availability ensured?
Fault tolerance, redundancy, patching.
What is non-repudiation in cybersecurity?
Proof of integrity and origin, ensuring authenticity using cryptographic methods.
What is the purpose of a hash function?
To represent data as a short, fixed-size string and verify integrity.
What are the three A’s in access control?
Authentication, Authorization, and Accounting.
What is a digital certificate used for?
To authenticate devices using a trusted Certificate Authority (CA).
What is a Gap Analysis?
A comparison of current security posture against desired goals to identify improvement areas.
What is Zero Trust?
A security model where nothing is trusted by default, and verification is required for all devices and users.
What are the functional planes in Zero Trust architecture?
Data plane, Control plane.
What are honeypots used for?
To attract and trap attackers in a controlled environment.
What is change management?
A formal process for managing updates to systems to avoid disruption and errors.
What is the purpose of version control?
To track changes and enable reversion if needed.
What is Public Key Infrastructure (PKI)?
A system for creating, managing, and validating digital certificates.
What is symmetric encryption?
Encryption and decryption using the same key.
What is asymmetric encryption?
Uses a pair of public and private keys; only the private key can decrypt data encrypted with the public key.
What is key escrow?
A third party holds a decryption key for recovery or access purposes.
What is full-disk encryption?
Encrypting all data on a storage device (e.g., BitLocker, FileVault).
What is transport encryption?
Encryption of data in transit using protocols like HTTPS or VPN.
What is hashing used for?
To verify data integrity by creating a fixed-size digest from input data.
What is a digital signature?
A cryptographic method to verify the authenticity and integrity of a message using a private key.