Chapter 2 Flashcards

(32 cards)

1
Q

What is the information security CIA triad?

A

C Confidentiality

I Integrity

A Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

is the process of verifying identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

is the principle that Information Systems, and supporting infrastructure are operating and accessible when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OECD privacy principles -Collection Limitation

A
  • collection should be obtained by lawful and fair means and where appropriate with the knowledge and consent of the data subject.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OECD privacy principles - Data Quality

A

Personal data should be relevant to the purpose collected and should be accurate, complete, and kept up to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OECD privacy principles - Use Limitation

A

Use Limitation - personal data should not be disclosed or otherwise used for purposes other then specified except with the consent of the data subject or by the authority of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OECD privacy principles - purpose Specification

A

purpose Specification - purpose for which personal data is collected should be specified not later than at the time of data collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality

A

is the assurance that information is not disclosed to unauthorized persons, processes, or devices. Confidentiality covers data in storage, during processing, and in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privacy

A

Is the right of an individual to control the use of their personal information.

Data Privacy controls relate to actions regarding collection, usage, notification, accuracy, and sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

foces on protectng the data in our possession from unauthorized access or disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authorization

A

is the process of approving access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-repudiation

A

is the process of assuring the validity and origin of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accounting

A

is the process of tracing actions to the source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Plane

A

is used for communication (moving data) between software components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Control Plane

A

is used by infrastructure components to maintain and configure assets, access control and communication security. In a ZT environment, requests for access are made through the control plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Policy Administrator

A

Control Plane - Part of the Policy Decision Point. generates any session-specific authentication and authentication token, or credential used to access an enterprise resource.

17
Q

Policy Decision Point

A

Control Plane - functions as a gatekeeper. The PDP has two logical components: Policy Engine & Policy Administrator

18
Q

Policy Enforcement Point

A

responsible for enabling, monitoring and eventually terminating connections between a subject and an enterprise resource.

19
Q

Policy Engine

A

Control Plane - Part of the Policy Decision Point. responsible for the ultimate decision to grant access to a resource for a given subject.

20
Q

CPTED - Crime prevention through environmental design

A

is that proper design and effective use of the physical environment can lead to a reduction in the incidence and fear of crime and increase safety.

21
Q

Sag

A

Moment of low voltage

22
Q

Temperature

A

between 64 and 80 degrees

23
Q

Fire use clean suppression like

A

FM-200, Novec 1230 or inert gases

24
Q

Power Protection Controls

A

Voltage regulator, surge protector, power line conditioners, battery backup/UPS

25
Power Resiliency Controls
Battery backup/UPS, generator, supplier diversity
26
Hot aisle - Cold aisle
Circulation pattern where rows of server racks are oriented so that the front of servers face each other?
27
Honeynet
Multiple linked honeypots that simulate a network environment.
28
Honeytoken
a beacon embedded into a document, database, images, directory and folders. Used to identify the attacker.
29
Honeyfile
a decoy file located on a network file share designed to detect access and exfiltration attempts.
30
Honey trap
deception technique that allows security defenders to understand attacker behavior patters. They are intended to look legitimate. Types of traps are: honeypots, honeynets, honeyfiles, and honeytokens.
31
Honeypot
is a decoy system like a webserver. They can be high-interaction or low-interaction.
32
DNS Sinkhole
DNS server that responds with false results. can be use to redirect malicious Internet traffic so it can be captured and analyzed. Can also be used to seize control of botnets.