Chapter 1 Flashcards

(50 cards)

1
Q

These controls include the processes that we put in place to manage technology in a secure manner.

A

Operational Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These controls are procedural mechanisms that focus on the mechanics of the risk management process.

A

Managerial Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These controls are the security controls that impact the physical world.

A

Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These controls enforce the CIA Triad (Confidentiality, Integrity, and Availability) in the digital space.

A

Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These controls are intended to stop a security issue before it occurs.

A

Preventative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These controls remediate security issues that have already occurred.

A

Corrective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These controls are designed to mitigate the risk associated with exceptions made to a security policy.

A

Compensating Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These controls inform employees and others what they should do to achieve security objectives.

A

Directive Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These controls seek to prevent an attacker from attempting to violate security policies.

A

Deterrent Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These controls identify security events that have already occurred.

A

Detective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These are specific measures that fulfill the security measures of an organization.

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PCI DSS criteria that must be met for compensating control to be satisfactory (3)

A
  1. The control must meet the intent and rigor of the original requirement.
  2. The control must provide a similar level of defense as the original requirement, such that the compensating control sufficiently offsets the risk of the original requirement.
  3. The control must be above and beyond other PCI DSS requirements.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This process reviews the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives.

A

Gap Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These are statements of a desired security state, but they do not by themselves carry out any actual security activities.

A

Control Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA Triad (3)

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This pillar ensures that unauthorized individuals are not able to gain access to sensitive information.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This pillar ensures that there are no unauthorized modifications to information or systems, either intentional or unintentional.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This pillar ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DAD Triad (3)

A
  1. Disclosure
  2. Alteration
  3. Denial
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is the threat of exposure of sensitive information to unauthorized individuals, otherwise known as data loss (confidentiality violation).

A

Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is the threat of unauthorized modification of information (integrity violation).

22
Q

This is the threat of a disruption to an authorized user’s legitimate access to information (availability violation).

23
Q

This process means that someone who performed some action, such as sending a message, cannot later deny having taken that action.

A

Nonrepudiation

24
Q

These occur when an organization experiences a breach of the CIA Triad (Confidentiality, Integrity, and Availability) of information and information systems.

A

Security Incidents

25
This process involves transforming information into a format where the original cannot be retrieved.
Data Obfuscation
26
Data obfuscation tools (3)
1. Tokenization 2. Hashing 3. Masking
27
In this attack, the attacker computes the hashes of those candidate values and then checks to see if those hashes exist in our data file.
Rainbow Table Attack
28
States of data (3)
1. Data at rest 2. Data in use 3. Data in transit
29
This state is stored data that resides on hard drives, tapes, in the cloud, or on other storage media.
Data at rest
30
This state is data that is actively in use by a computer system. This includes the data stored in memory while processing takes place.
Data in use
31
This state is data that is in motion over a network.
Data in transit
32
This technology uses mathematical algorithms to protect information from unauthorized disclosure. It converts information from plain text into ciphertext.
Data Encryption
33
This technology helps organizations enforce information handling policies and procedures to prevent data loss and theft.
Data Loss Prevention (DLP)
34
Data Loss Prevention (DLP) works in different environments (2)
1. Agentless (network based) DLP 2. Agent based DLP
35
These DLP systems are dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain any unencrypted sensitive information.
Agent based DLP
36
These DLP systems have software agents installed on them that search those systems for the presence of sensitive information. It can also monitor system configurations and user actions, blocking undesirable actions.
Agentless (network based) DLP
37
Data Loss Prevention (DLP) mechanisms of action (2)
1. Pattern matching 2. Watermarking
38
This DLP mechanism of action is where they watch for telltale signs of sensitive information.
Pattern matching
39
This DLP mechanism of action is where systems or administrators apply electronic tags to sensitive documents, and the DLP system can monitor systems and networks for unencrypted content containing those tags.
Watermarking
40
These techniques seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.
Data Minimization
41
This process removes the ability to link data back to an individual, reducing its sensitivity.
Deidentification
42
These are security controls/measures that limit the ability of individuals or systems to access sensitive information or resources.
Access Restrictions
43
Different types of access restrictions (2)
1. Geographic restriction 2. Permissions restriction
44
These controls/measures limit access to resources based on a physical location of the user or system.
Geographic restriction
45
These controls/measures limit access to resources based on the user’s role or level of authorization.
Permissions restriction
46
This process places sensitive systems on separate networks where they may communicate with each other but have strict restrictions on their ability to communicate with systems on other networks.
Segmentation
47
This process completely cuts a system off from access to or from outside networks.
Isolation
48
Different types of Risks (5)
1. Reputational 2. Strategic 3. Operational 4. Compliance 5. Financial
49
Security controls categorized based on their mechanism of action (4)
1. Operational Controls 2. Managerial Controls 3. Physical Controls 4. Technical Controls
50
Security controls categorized based on their desired effect (6)
1. Preventative Controls 2. Corrective Controls 3. Compensating Controls 4. Directive Controls 5. Deterrent Controls 6. Detective Controls