Fundamentals of Security Flashcards

1
Q

Information Security

A

Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Ensures information is accessible only to authorized personnel (e.g.,
encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Ensures data remains accurate and unaltered (e.g., checksums)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Ensures information and resources are accessible when needed (e.g.,
redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudiation

A

Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIANA Pentagon

A

An extension of the CIA triad with the addition of non-repudiation and
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Triple A’s of Security

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Control Categories

A

■ Technical
■ Managerial
■ Operational
■ Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Control Types

A

■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero Trust Model

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To achieve zero trust, we use what two PLANES?

A

■ Control Plan
■ Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control Plane

A

Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Plane

A

Subject/system, policy engine, policy administrator, and
establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat

A

Anything that could cause harm, loss, damage, or compromise to our information
technology systems

■ Disasters
■ Cyber attacks
■ Security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability

A

Any weakness in the system design or implementation that is INTERNAL

■ Missing security patches
■ Bugs
■ Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Management

A

Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Confidentiality

A

■ Information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3 main reasons why confidentiality is important

A

■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the five basic methods to ensure confidentiality?

A

■ Encryption
■ Access Controls
■ Data Masking
■ Physical Security Measures
■ Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Encryption

A

Process of converting data into a code to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Access Controls

A

By setting up strong user permissions, you ensure that only authorized
personnel can access certain types data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Masking

A

Method that involves obscuring specific data within a database to make it
inaccessible for unauthorized users while retaining the real data’s
authenticity and use for authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Physical Security Measures

A

Ensure confidentiality for both physical types of data, such as paper
records stored in a filing cabinet, and for digital information contained on
servers and workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Training and Awareness

A

Conduct regular training on the security awareness best practices that
employees can use to protect their organization’s sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Integrity

A

Helps ensure that information and data remain accurate and unchanged from its
original state unless intentionally modified by an authorized individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the three main reasons why Integrity is important?

A

■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the five methods used to help us maintain the integrity of our data, systems, and networks?

A

■ Hashing
■ Digital Signatures
■ Checksums
■ Access Controls
■ Regular Audits

29
Q

Hashing

A

Process of converting data into a fixed-size value

30
Q

Digital Signatures

A

Ensure both integrity and authenticity

31
Q

Checksums

A

Method to verify the integrity of data during transmission

32
Q

Access Controls

A

Ensure that only authorized individuals can modify data and this reduces
the risk of unintentional or malicious alterations

33
Q

Regular Audits

A

involve systematically reviewing logs and operations to ensure that only
authorized changes have been made, and any discrepancies are
immediately addressed

34
Q

Availability

A

Ensure that information, systems, and resources are accessible and operational
when needed by authorized users
■ Continuity
■ Maintaining Customer Trust
■ Upholding an Organization’s Reputation

35
Q

What is needing to combat the challenges that come with availability?

A

Redundancy

36
Q

Redundancy

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability

37
Q

What are the four types of redundancy?

A

■ Server
■ Data
■ Network
■ Power

38
Q

Server Redundancy

A

Involves using multiple servers in a load balanced or failover configuration
so that if one is overloaded or fails, the other servers can take over the
load to continue supporting your end users

39
Q

Data Redundancy

A

Involves storing data in multiple places

40
Q

Network Redundancy

A

Ensures that if one network path fails, the data can travel through
another route

41
Q

Power Redundancy

A

Involves using backup power sources, like generators and UPS systems

42
Q

Non-repudiation

A

Security measure that ensures individuals or entities involved in a
communication or transaction cannot deny their participation or the authenticity
of their actions

43
Q

Digital Signatures

A

Created by first hashing a particular message or communication that you want to
digitally sign, and then it encrypts that hash digest with the user’s private key
using asymmetric encryption

44
Q

Authentication

A

Security measure that ensures individuals or entities are who they claim to be
during a communication or transaction

45
Q

What are the 5 authentication methods used?

A

■ Knowledge
■ Possession
■ Inherence
■ Location
■ Action

46
Q

Knowledge Factor

A

Relies on information that a user can recall

47
Q

Possession Factor

A

Relies on the user presenting a physical item to authenticate themselves

48
Q

Inherence Factor

A

Relies on the user providing a unique physical or behavioral characteristic
of the person to validate that they are who they claim to be

49
Q

Action Factor

A

Relies on the user conducting a unique action to prove who they are

50
Q

Location Factor

A

Relies on the user being in a certain geographic location before access is
granted

51
Q

Authorization

A

Pertains to the permissions and privileges granted to users or entities after they
have been authenticated

52
Q

Accounting

A

Security measure that ensures all user activities during a communication or
transaction are properly tracked and recorded

53
Q

What are the 4 Broad Categories of Security Controls?

A

■ Technical
■ Operational
■ Managerial
■ Physical

54
Q

Technical Controls

A

Technologies, hardware, and software mechanisms that are implemented
to manage and reduce risks
(Antivirus,firewall)

55
Q

Managerial/Admin Controls

A

Involve the strategic planning and governance side of security

56
Q

Operational Controls

A

Procedures and measures that are designed to protect data on a
day-to-day basis

57
Q

Physical Controls

A

Tangible, real-world measures taken to protect assets(cameras, doors, security people)

58
Q

What are the 6 Basic Types of Security Controls?

A

■ Preventive
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive

59
Q

Preventive Controls

A

Proactive measures implemented to thwart potential security threats or
breaches

60
Q

Deterrent Controls

A

Discourage potential attackers by making the effort seem less appealing
or more challenging

61
Q

Detective Controls

A

Monitor and alert organizations to malicious activities as they occur or shortly thereafter

62
Q

Corrective Controls

A

Mitigate any potential damage and restore our systems to their normal
state

63
Q

Compensating Controls

A

Alternative measures that are implemented when primary security
controls are not feasible or effective

64
Q

Directive Controls

A

● Guide, inform, or mandate actions
● Often rooted in policy or documentation and set the standards for
behavior within an organization

65
Q

What are the 2 types of Gap Analysis?

A

■ Technical Gap Analysis
■ Business Gap Analysis

66
Q

Technical Gap Analysis

A

● Involves evaluating an organization’s current technical infrastructure
● identifying any areas where it falls short of the technical capabilities
required to fully utilize their security solutions

67
Q

Business Gap Analysis

A

● Involves evaluating an organization’s current business processes
● Identifying any areas where they fall short of the capabilities required to
fully utilize cloud-based solutions

68
Q

Zero Trust

A

Zero Trust demands verification for every device, user, and transaction within the
network, regardless of its origin

69
Q

What are the two different planes to create a zero trust architecture?

A

■ Control Plane
■ Data Plane