CISSP Flashcards
(74 cards)
What is the triad of principles that make-up Security
CIA
Cofidentiality
Integrity
Availability
What is Availability?
Ensures reliability and timely acces to data and resources to authorize individuals.
What is Integrity?
The assurance of the accuracy and reliability of information and systems. The provention of any unauthorized modifictions.
What is Confidentiality?
The necessary level of secrecy is enforced at eah junction of the data processing and prevention of unauthorized disclosure.
What is Balanced Security?
Keep the triad (CIA) balanced
see pg 5-6 for list
What are the goals of security?
Availibility
Integrity
Confidentiality
What are the terminologies used in the security industry?
Vulnerability
Threat
Risk
Control
Why are controls put into place?
To reduce the Risk to the organization
What are Technical Controls?
Logical controls, are software or hardware components such as firewalls, IDS, encryption, and identification and authentication mechanisims.
What is defense-in-depth?
is the coordinated use of multiple security controls in a layered approach.
Whats the sequence of Threats?
Threat Agent
Threat
Vulnerability
Risk
Asset
Exposure
Safeguard
What does IDS stand for?
Intrusion Detection System
What is the rule of thumb when it comes to sensitive assets?
The more sensitive the asset, the more layers of security should be in place.
What are the different functionalities of security controls?
Preventive
Detective
Corrective
Deterrent
Recovery
Cmpensating
What is the Preventive function of security?
Intended to avoid an incident from occuring
What is Detective function of security?
Helps identify an incident’s activities and potentially an intruder
What is Corrective funtion of security?
Fixes components or systems after an incident has occured
What is Deterrent function of security?
Intended to discourage a potential attacker
What is Recovery function of security?
Intended to bring the environment back to regular operations
What is Compensating function of security?
Controls that provide an alternative measure of control
45
True or False, prentative and detective controls should be implemented together.
True
You should prevent first and what you can’t prevent, you should detect. Each should complement eachother
What are the Preventive Control types?
Preventive Administrative
Preventive Physical
Preventive Technical
What type of computer memory improves system performance by acting as a special storage area for information that is retrieved often?
A) RAM
B) Virtual
C) Cache
D) Primaty
C) Cache
Which of the following is the most common security issue for most companies?
A) IP spoofing
B) Dumpster diving
C) Excessive privileges
D) Denial of service
C) Excessive privileges