Fundamentals of Security Flashcards

Section 2 (95 cards)

1
Q

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure and corruption and destruction.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The data that systems hold, not the data systems themselves is an example of what?

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Act of protecting the systems that hold and process the critical data.

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The actual data systems (cell phones, computers, servers) not the actual data they hold are an example of what?

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the CIA Triad also known as the 3 pillars of security

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensures that information is only accessible to those with appropriate authorization.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Pillar of security is this an example of. Encrypting sensitive files and authorizing specific people to de-encrypt them and read them.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ensures that data remains accurate and unaltered unless modification is required.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Pillar of security is this an example of. Checksums can be used to verify that a file has not been changed or corrupted as it moves along a network during a data transfer

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ensures that information and resources are accessible and functional when needed by authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Pillar of security is this an example of. When you implement redundancy measures for a website to ensure it remains online and up at any time regardless of how much traffic it is receiving.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the CIANA Pentagon

A

Confidentiality
Integrity
Availability
Non-Repudiation
Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sending an email that has been digitally signed that a person cannot deny sending the email is an example of what

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the AAA of Security

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process of verifying the identity of a user or system

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Defines what actions or resources a user can access

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Act of tracking user activities and resource usage, typically for auditing or billing purposes

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is an example of what AAA of security. When you try to login to get our email username and password is being checked against a stored version to confirm your identity.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is an example of what AAA of security. In a company database you as an employee you may have access to view records but you many not have access to edit them so you have read permission

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is an example of what AAA of security. When you log into your computer what you do is being logged to be able to monitor unusual or unauthorized behavior.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity and availability of information systems and data

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are Security Control Categories

A

Technical
Managerial
Operational
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are Security Control Types

A

Preventative
Deterrent
Detective
Corrective
Compensation
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Security model that operates on the principle that no one whether inside or outside the organization should be trusted be default.
Zero Trust
26
Verification required for everybody is an example of what.
Zero Trust
27
Consists of the adaptive identity, threat scope reduction, policy-driven access control and secured zones.
Control Plane
28
Focused of the subject/system, policy engine, policy administrator, and establishing policy enforcement points.
Data Plane
29
Anything that could cause harm, loss, damage or compromise to information technology systems.
Threat
30
External Source Threats are threats we cannot fully control. Name four types
Natural Disasters Cyber Attacks Data integrity breaches Disclosure of confidential infomration
31
Any weakness in the system design or implementation
Vulnerability
32
Internal factors are threats we can control and prevent name 5 examples
Softeware bugs Misconfigured software Improperly protected network devices Missing security patches Lack of physical security
33
Finding different ways to minimize the likely hood of an outcome occurring and achieving the desired outcomes
Risk Management
34
This is an example of what Threat, Vulnerability or Risk Management. You are trying to get to work on time but you remember you have to stop and get gas causing you to be late.
Vulnerability - Getting gas is something that could have been done the night before. Vulnerabilities can be prevented
35
This is an example of what Threat, Vulnerability or Risk Management. You are trying to get to work on time but a there is a car accident on the high way you are now stuck in traffic causing you to be late.
Threat - You could not have prevented the other driver to not cause a car accident
36
This is an example of what Threat, Vulnerability or Risk Management. You are trying to get to work on time you feel rushed so you decide to leave an extra 30 minutes early.
Risk Management - You are giving yourself extra time incase any vulnerabilities or threats pop up on your way to work
37
Refers to the process of information from unauthorized access and disclosure
Confidentiality
38
This is an example of what CIA. Sensitive data is only to be seen by authorized people
Confidentiality
39
What are the 5 basic methods of Confidentiality
Encryption Access controls Data masking Physical Security Measures Training and awareness
40
Process of converting data into code to prevent unauthorized access
Encryption
41
This is an example of what 5 basic methods of Confidentiality (Encryption, Access Controls, Data Masking, Physical Security Measures, Training and awareness) Scrambles the plane text data into an indecipherable jumble until the right decryption key is provided.
Encryption
42
Ensure only authorized personal can access certain type of access
Access Control
43
This is an example of what 5 basic methods of Confidentiality (Encryption, Access Controls, Data Masking, Physical Security Measures, Training and awareness) Your boss might want you to save your personal record on the companies shared drive but they only want themselves to access it. Permissions are set to give them read/right access.
Access Control
44
Method that involves obscuring data within a data base to make it in accessible for unauthorized users while retaining the real data's authenticity and use for authorized users.
Data Masking
45
This is an example of what 5 basic methods of Confidentiality (Encryption, Access Controls, Data Masking, Physical Security Measures, Training and awareness) Hiding the first 12 numbers of a credit card but showing the last four numbers.
Data Masking
46
Used to ensure confidentiality for physical types of data and for digital information contained on servers and worksheets
Physical Security Measures
47
This is an example of what 5 basic methods of Confidentiality (Encryption, Access Controls, Data Masking, Physical Security Measures, Training and awareness) Locking doors to filing cabinets or installing security cameras.
Physical Security Measures
48
Conducting regular training on the security awareness best practices that employees can use to protect the organization.
Training and awareness
49
Confidentiality should always be paired with what word
Encryption
50
Helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual.
Integrity
51
What are the 5 methods of Integrity
Hashing Digital Signature Checksums Access Controls Regular Audits
52
Integrity should always be paired with what word.
Hashing
53
Process of converting data into a fixed size volume
Hashing
54
Use encryption to ensure integrity and authenticity
Digital Signature
55
Method to verify integrity of data during transmission
Checksums
56
Ensure that only authorized individuals can modify data and reduce the risk of unintentional or malicious alternations
Access Control
57
Reviewing logs and operations to ensure that only authorized changes have been made and discrepancies are addressed
Regular Audits
58
Used to ensure that information, systems, and resources are accessible and operational when needed by authorized users
Availability
59
What word should always be paired with Availability
Redundancy
60
Duplicates critical components or functions of a system with the intent of enhancing its reliability
Redundancy
61
What are 4 types of redundancy
Server Redundancy Data Redundancy Network Redundancy Power Redundancy
62
Focused on providing undeniable proof in digital transations
Non-Repudiation
63
Proof it was sent by a specific user
Digital Signature
64
What are 3 important reasons of non-repudiation
Confirming the authenticity of digital transactions Ensuring Integrity Providing Accountability
65
Non-Repudiation should always be paired with what word
Digital Signature
66
Security measures that ensures individual or entities are who they claim to be during a communication or transaction.
Authentication
67
What are the 5 common authentication methods
Something you know Something you have Something you are Something you do Something you are
68
Permissions and privileges granted to users or entities after they have been authenticated
Authorization
69
Security measure that ensures all users activities are properly tracked and recorded.
Accounting
70
Used to aggregate logs from various network devices so systems admins can analyze them to detect patterns or anomalies in he organization
Syslog Server
71
Used to capture and analyze network traffic to gain detailed insights into all the data moving with in a network.
Network Analyzer
72
Provides real-time analysis of security alerts generated by various hardware and software infrastructures in an organization
Security Information and Event Management (SIEM)
73
4 Types of Security Control Categories
1. Technical Controls 2. Managerial Controls 3. Operational Controls 4. Physical Controls
74
6 Types of Security Control Types
1. Preventative Controls 2. Deterrent Controls 3. Detective Controls 4. Corrective Controls 5. Compensating Controls 6. Directive Controls
75
Which Security Control builds our foundation 1. Preventative Controls 2. Deterrent Controls 3. Detective Controls 4. Corrective Controls 5. Compensating Controls 6. Directive Controls
1. Preventative Controls Proactive measures implemented to thwart potential security threats or breaches. Example: Firewall
76
Which Security Control Discourages threats 1. Preventative Controls 2. Deterrent Controls 3. Detective Controls 4. Corrective Controls 5. Compensating Controls 6. Directive Controls
2. Deterrent Controls Aim to discourage potential attackers by making the effort seem less appealing or more challenging. Example: Warning signs on property or a banner on a website
77
Which Security Control Keeps a watchful eye 1. Preventative Controls 2. Deterrent Controls 3. Detective Controls 4. Corrective Controls 5. Compensating Controls 6. Directive Controls
3. Detective Controls Monitor and alerts organizations to malicious activities as they occur or shortly there after. Example: Security camera, Intrusion detection system (IDS) in a network system
78
Which Security Control has to do with Emergency 1. Preventative Controls 2. Deterrent Controls 3. Detective Controls 4. Corrective Controls 5. Compensating Controls 6. Directive Controls
4. Corrective Controls Mitigate any potential damage and restore the systems to their normal state. Example: Anti virus software quarantine and removing malicious software.
79
Which Security Control has to do with Backups 1. Preventative Controls 2. Deterrent Controls 3. Detective Controls 4. Corrective Controls 5. Compensating Controls 6. Directive Controls
5. Compensating Controls Alternative measures that are implemented when primary security controls are not feasible or effective
80
Which Security Control Guides entire process 1. Preventative Controls 2. Deterrent Controls 3. Detective Controls 4. Corrective Controls 5. Compensating Controls 6. Directive Controls
6. Directive Controls Often rooted in policy or documentation and set the standards for behavior within an organization. Example: A policy on how to use company equipment
81
Process of evaluating the differences between an organization current performance and its desired performance
Gap Analysis
82
What are 2 types of gap analysis
1. Technical Gap Analysis 2. Business Gap Analysis
83
What type of gap analysis involves evaluating an organizations current technical infrastructure and identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions
Technical Gap Analysis
84
What type of gap analysis involves evaluating an organizations current business process and identifying any areas where they fall short of the capabilities required to fully utilize cloud based solutions
Business Gap Analysis
85
Plan of Action and Milestones (POA&M)
Outline the specific measures to address each vulnerability, allocate resources and set up timelines for each remediation task that is needed.
86
The overarching framework and set of components responsible for defining managing and enforcing the policies related to users and system access within an organization
Control Plane
87
Ensures that the polices and procedures are properly executed
Data Plane
88
Is this a control plane or a data plane Adaptive Identity: Identities that rely on real time validation that takes into account the users behavior device, location and other factors like that.
Control Plane
89
Is this a control plane or a data plane Threat scope reduction: Limits the users access to only what they need for their work tasks
Control Plane
90
Is this a control plane or a data plane Secured Zones: Isolated environments within a network that are designed to house sensitive data
Control Plane
91
Is this a control plane or a data plane Policy-Driven Access Control: Entails developing, managing , and enforcing user access policies based on their roles and responsibilities
Control Plane
92
Is this a control plane or a data plane Subject/System: Refers to the individual or entity attempting to gain access
Data Plane
93
Is this a control plane or a data plane Policy Engine: Cross-references the access request with its pre-defined policies
Data Plane
94
Is this a control plane or a data plane Policy Administrator: Used to establish and manage the access polices
Data Plane
95
Is this a control plane or a data plane Policy Enforcement Point: Allow or restrict access and it will effectively act as a gatekeeper to the sensitive areas of the systems or networks
Data Plane