Domain 1 - Key Security Terminologies Flashcards

(17 cards)

1
Q

What is a threat in cybersecurity?

A

A potential harmful event that can cause damage to an organization.

Threats can be human-made or non-human-made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three types of damage caused by threats?

A
  • Confidentiality: Unauthorized disclosure of sensitive information.
  • Integrity: Alteration or manipulation of data.
  • Availability: Disruption of access to services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are assets in the context of cybersecurity?

A

Resources owned by an organization that hold economic value.

Assets can be tangible or intangible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two types of assets?

A
  • Tangible: Physical resources such as buildings and equipment.
  • Intangible: Non-physical resources including trade secrets and organizational reputation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it important to protect assets?

A

They contribute to an organization’s credibility, revenue, and operational integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a vulnerability?

A

Weaknesses or flaws in a system, application, network, or human behavior that can be exploited by threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two types of vulnerabilities?

A
  • Technical: Security weaknesses in software, hardware, or systems.
  • Non-Technical: Human vulnerabilities, such as lack of security awareness.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are vulnerabilities tracked?

A

Using unique identifiers known as Common Vulnerabilities and Exposures (CVE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What system is used to assess the criticality of vulnerabilities?

A

Common Vulnerability Scoring System (CVSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a zero-day vulnerability?

A

A vulnerability that is exploited before a fix is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is essential for mitigating zero-day vulnerabilities?

A

Applying patches and updates promptly, and employing robust security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a holistic security program?

A

Encompasses patching, monitoring, optimization, and enhancement of security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the elements of an attack?

A

A combination of a threat, a motivated threat actor, and a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are common goals of many attacks?

A

Data exfiltration or theft, seeking to compromise sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is crucial for detecting unauthorized data collection?

A

Proactive monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is needed to achieve a mature security posture?

A

A comprehensive approach involving multiple layers of defense and ongoing improvement.

17
Q

True or False: Effective security is only about implementing controls.

A

False. It is also about maintaining a dynamic and evolving security strategy.