Chapter 1 Flashcards

(38 cards)

1
Q

CIA Triad

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Unauthorized individuals are not able to gain access to sensitive information

prevent using: fireballs, access control lists, and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

No unauthorized modifications are made to information or systems

Prevent using: basing and integrity monitoring solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Information and systems are ready to meet the needs to legitimate users when they are requested

Prevent using: fault tolerance, clustering, and backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security incidents

A

Organizations experience a breach of the CIA triad of information or information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DAD Triad

A

Three key threats to cybersecurity efforts: disclosure, alteration, denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disclosure

A

Exposure if sensitive information to unauthorized individuals, violating confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Alteration

A

Unauthorized modification of information violating integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial

A

Unintended disruption of an authorized users legitimate access to information violating availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data exfiltration

A

Attacker gains access to sensitive information and removes It from the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Breach impact

A

Measured risk by: financial, reputations, strategic, operational, and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Financial risk

A

Risk of monetary damage to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reputational risk

A

Negative publicity surrounding a breach causes loss of customers, employees, suppliers, and stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Strategic risk

A

Risk that an organization will become less effective in meeting major goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operational risk

A

Risk to the organizations ability to carry out day to day functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compliance risk

A

Security breach causes an organization to run afoul of legal or regulatory requirements

17
Q

Security controls

A

Specific measures that fulfill the security objectives of an organization

Categories: technical, operational, managerial

18
Q

Technical controls

A

Enforce CIA in the digital space

Examples: firewall rules, access control lists, intrusion prevention systems, encryption

19
Q

Operational controls

A

The process to manage technology in a secure manner

Examples: user access reviews, log monitoring, and vulnerability management

20
Q

Managerial controls

A

Procedures focused in the mechanics of the risk management process

Examples: risk assessment, security planning exercises, incorporation if security into change management/service acquisition/project management practices

21
Q

Preventative controls

A

Stop a security issue before It occurs

Examples: firewalls, encryption

22
Q

Detective controls

A

Identify security events that have already occurred

Example: intrusion detection systems

23
Q

Corrective controls

A

Remediate security issues that have occurred

Example: restoring backups after an attack

24
Q

Deterrent controls

A

Seek to prevent an attacker from attentions to violate security policies

Example: guard dogs, wired fence

25
Physical controls
Security controls that impact the physical world Example: fences, perimeter lighting, locks, fire suppression, burglar alarm
26
Compensating controls
Designed to mitigate the risk associated with exceptions made to a security policy
27
Data loss prevention (DLP) systems
Search systems for stores of sensitive information that might be unsecured and monitor network traffic for potential attempts to remove sensitive information from the organization Environments: host-based DLP and network DLP
28
Host-based DLP
Uses software agents installed on a system to search for the presence of sensitive information and monitors system configurations and users actions, blocking undesirable actions
29
Network-based DLP
Devices dedicated to sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information
30
DLP mechanisms of action
Pattern matching and watermarking
31
Pattern matching
Watch for signs of sensitive information Example: numbers formatted like a credit card or ssn
32
Watermarking
Systems or administrators apply electronic tags to sensitive documents and the DLP system monitors systems and networks for unencrypted content containing those tags
33
Data minimization
Reduce risk by reducing the amount of sensitive information that we maintain on a regular basis
34
De-identification
Removed the ability to link data back to an individual
35
Data obfuscation
Data is transformed into a format where the original information cannot be retrieved Tools: hashing, tokenization, masking
36
Hashing
Transform a value in a dataset to a corresponding hash value
37
Tokenization
Replaced sensitive values with a unique identifier using a look up table
38
Masking
Partially redacts sensitive information by replacing some or all sensitive fields with blank characters Example: credit cards numbers replaced with * except for the last 4 numbers