Fundamental of Security Flashcards
Threat
What is a threat in the context of information technology systems?
Anything that could cause harm, loss, damage, or compromise to our information technology systems.
Threat
What are some sources of threats to information technology systems?
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information
Vulnerability
What is a vulnerability?
Any weakness in the system design or implementation
Vulnerabilities can lead to security breaches and exploitation by attackers.
Vulnerability
What are internal factors that can lead to vulnerabilities?
- Software bugs
- Misconfigured software
- Improperly protected network devices
- Missing security patches
- Lack of physical security
These factors can significantly compromise the security of a system.
Vulnerability
What is risk management?
Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome.
Risk management involves identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.
Confidentility
What does confidentiality refer to?
The protection of information from unauthorized access and disclosure
Confidentiality is crucial in various fields, including healthcare, business, and data management.
Confidentility
Why is confidentiality important? List the main reasons.
- To protect personal privacy
- To maintain a business advantage
- To achieve regulatory compliance
These reasons highlight the necessity of confidentiality in both personal and organizational contexts.
Confidentility
What is encryption?
The process of converting data into a code to prevent unauthorized access
Encryption is a key method for ensuring data confidentiality.
Confidentility
What do access controls do?
Set up strong user permissions to ensure that only authorized personnel can access certain types of data
Access controls are essential for maintaining the integrity of sensitive information.
Confidentility
What is data masking?
A method that obscures specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity for authorized users
Data masking is often used in testing and development environments.
Confidentility
What are physical security measures?
Measures that ensure confidentiality for both physical types of data, such as paper records, and for digital information contained on servers and workstations
Physical security is a critical aspect of overall data protection strategies.
Confidentility
What is the purpose of training and awareness in confidentiality?
To conduct regular training on security awareness best practices that employees can use to protect their organization’s sensitive data
Ongoing training helps build a culture of security within an organization.
Integrity
What does integrity help ensure regarding information and data?
Integrity helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual.
Integrity
What are the three main reasons why integrity is important?
- To ensure data accuracy
- To maintain trust
- To ensure system operability
Integrity
What is hashing?
Hashing is the process of converting data into a fixed-size value.
Integrity
What do digital signatures ensure?
Digital signatures ensure both integrity and authenticity.
Integrity
What is the purpose of checksums?
Checksums are a method to verify the integrity of data during transmission.
Integrity
What do access controls ensure?
Access controls ensure that only authorized individuals can modify data, reducing the risk of unintentional or malicious alterations.
Integrity
What do regular audits involve?
Regular audits involve systematically reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are immediately addressed.
Integrity
Fill in the blank: Integrity verifies the accuracy and trustworthiness of data over its _______.
lifecycle
Availability
What is the primary goal of ensuring availability in cybersecurity?
To ensure that information, systems, and resources are accessible and operational when needed by authorized users.
Availability
List three reasons why availability is valued by cybersecurity professionals.
- Ensuring Business Continuity
- Maintaining Customer Trust
- Upholding an Organization’s Reputation
Availability
What is the best strategy to overcome challenges associated with maintaining availability?
To use redundancy in your systems and network designs.
Availability
What is server redundancy?
Using multiple servers in a load balanced or failover configuration to ensure support for end users if one server fails.