Fundamentals of Security Flashcards

(101 cards)

1
Q

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensures information is accessible only to authorized personnel (e.g.,
encryption)

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensures data remains accurate and unaltered (e.g., checksums)

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensures information and resources are accessible when needed (e.g.,
redundancy measures)

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An extension of the CIA triad with the addition of non-repudiation and
authentication

A

CIANA Pentagon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Triple A’s of Security

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Verifying the identity of a user or system (e.g., password checks)

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Determining actions or resources an authenticated user can access (e.g.,
permissions)

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tracking user activities and resource usage for audit or billing purposes

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Control Categories

A

■ Technical
■ Managerial
■ Operational
■ Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Control Types

A

■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operates on the principle that no one should be trusted by default. To achieve zero trust, we use the control plane and the data plane.

A

Zero Trust Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones

A

Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Subject/system, policy engine, policy administrator, and
establishing policy enforcement points

A

Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Anything that could cause harm, loss, damage, or compromise to our information
technology systems. Can come from the following:
● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Any weakness in the system design or implementation. Come from internal factors like the following:
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Refers to the protection of information from unauthorized access and disclosure. Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Confidentiality is important for 3 main reasons

A

■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

To ensure confidentiality, we use five basic methods

A

Encryption
Access Controls
Data Masking
Physical Security Measures
Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Process of converting data into a code to prevent unauthorized access

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
By setting up strong user permissions, you ensure that only authorized personnel can access certain types data
Access Controls
26
Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data's authenticity and use for authorized users
Data Masking
27
Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations
Physical Security Measures
28
Conduct regular training on the security awareness best practices that employees can use to protect their organization’s sensitive data
Training and Awareness
29
Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual. Verifies the accuracy and trustworthiness of data over the entire lifecycle
Integrity
30
Integrity is important for three main reasons
■ To ensure data accuracy ■ To maintain trust ■ To ensure system operability
31
To help us maintain the integrity of our data, systems, and networks, we usually utilize five methods
Hashing Digital Signatures Checksums Access Controls Regular Audits
32
Process of converting data into a fixed-size value
Hashing
33
Ensure both integrity and authenticity
Digital Signatures
34
Method to verify the integrity of data during transmission
Checksums
35
Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations
Access Controls
36
Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed
Regular Audits
37
Ensure that information, systems, and resources are accessible and operational when needed by authorized users
Availability
38
As cybersecurity professionals, we value availability since it can help us with the following:
■ Ensuring Business Continuity ■ Maintaining Customer Trust ■ Upholding an Organization's Reputation
39
To overcome the challenges associated with maintaining availability, the best strategy is to us ____________ in your systems and network designs
Redundancy
40
Duplication of critical components or functions of a system with the intention of enhancing its reliability.
Redundancy
41
There are various types of redundancy you need to consider when designing your systems and networks
Server Redundancy Data Redundancy Network Redundancy Power Redundancy
42
Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over the load to continue supporting your end users
Server Redundancy
43
Involves storing data in multiple places
Data Redundancy
44
Ensures that if one network path fails, the data can travel through another route
Network Redundancy
45
Involves using backup power sources, like generators and UPS systems
Power Redundancy
46
■ Focused on providing undeniable proof in the world of digital transactions ■ Security measure that ensures individuals or entities involved in a communication or transaction cannot deny their participation or the authenticity of their actions
Non-repudiation
47
■ Considered to be unique to each user who is operating within the digital domain ■ Created by first hashing a particular message or communication that you want to digitally sign, and then it encrypts that hash digest with the user’s private key using asymmetric encryption
Digital Signatures
48
Non-repudiation is important for three main reasons
■ To confirm the authenticity of digital transactions ■ To ensure the integrity of critical communications ■ To provide accountability in digital processes
49
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
Authentication
50
5 commonly used authentication methods
Something you know (Knowledge Factor) Something you have (Possession Factor) Something you are (Inherence Factor) Something you do (Action Factor) Somewhere you are (Location Factor)
51
Relies on information that a user can recall
Something you know (Knowledge Factor)
52
Relies on the user presenting a physical item to authenticate themselves
Something you have (Possession Factor)
53
Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be
Something you are (Inherence Factor)
54
Relies on the user conducting a unique action to prove who they are
Something you do (Action Factor)
55
Relies on the user being in a certain geographic location before access is granted
Somewhere you are (Location Factor)
56
Security process that requires users to provide multiple methods of identification to verify their identity
Multi-Factor Authentication System (MFA)
57
Authentication is critical to understand because of the following
■ To prevent unauthorized access ■ To protect user data and privacy ■ To ensure that resources are accessed by valid users only
58
Pertains to the permissions and privileges granted to users or entities after they have been authenticated
Authorization
59
Authorization mechanisms are important to help us with the following
■ To protect sensitive data ■ To maintain the system integrity in our organizations ■ To create a more streamlined user experience
60
Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded
Accounting
61
Your organization should use a robust accounting system so that you can create the following
Create an audit trail Maintain regulatory compliance Conduct forensic analysis Perform resource optimization Achieve user accountability
62
Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a source or point in time
Create an audit trail
63
Maintains a comprehensive record of all users’ activities
Maintain regulatory compliance
64
Uses detailed accounting and event logs that can help cybersecurity experts understand what happened, how it happened, and how to prevent similar incidents from occurring again
Conduct forensic analysis
65
Organizations can optimize system performance and minimize costs by tracking resource utilization and allocation decisions
Perform resource optimization
66
Thorough accounting system ensures users’ actions are monitored and logged , deterring potential misuse and promoting adherence to the organization’s policies
Achieve user accountability
67
To perform accounting, we usually use different technologies like the following
Syslog Servers Network Analysis Tools Security Information and Event Management (SIEM) Systems
68
Used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organization’s systems
Syslog Servers
69
Used to capture and analyze network traffic so that network administrators can gain detailed insights into all the data moving within a network
Network Analysis Tools
70
Provides us with a real-time analysis of security alerts generated by various hardware and software infrastructure in an organization
Security Information and Event Management (SIEM) Systems
71
4 Broad Categories of Security Controls
Technical Controls Managerial Controls Operational Controls Physical Controls
72
Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks
Technical Controls
73
● Sometimes also referred to as administrative controls ● Involve the strategic planning and governance side of security
Managerial Controls
74
● Procedures and measures that are designed to protect data on a day-to-day basis ● Are mainly governed by internal processes and human actions
Operational Controls
75
Tangible, real-world measures taken to protect assets
Physical Controls
76
6 Basic Types of Security Controls
Preventive Controls Deterrent Controls Detective Controls Corrective Controls Compensating Controls Directive Controls
77
Proactive measures implemented to thwart potential security threats or breaches
Preventive Controls
78
Discourage potential attackers by making the effort seem less appealing or more challenging
Deterrent Controls
79
Monitor and alert organizations to malicious activities as they occur or shortly thereafter
Detective Controls
80
Mitigate any potential damage and restore our systems to their normal state
Corrective Controls
81
Alternative measures that are implemented when primary security controls are not feasible or effective
Compensating Controls
82
● Guide, inform, or mandate actions ● Often rooted in policy or documentation and set the standards for behavior within an organization
Directive Controls
83
Process of evaluating the differences between an organization's current performance and its desired performance
Gap Analysis
84
There are several steps involved in conducting a gap analysis
■ Define the scope of the analysis ■ Gather data on the current state of the organization ■ Analyze the data to identify any areas where the organization's current performance falls short of its desired performance ■ Develop a plan to bridge the gap
85
2 Basic Types of Gap Analysis
Technical Gap Analysis Business Gap Analysis
86
● Involves evaluating an organization's current technical infrastructure ● identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions
Technical Gap Analysis
87
● Involves evaluating an organization's current business processes ● Identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions
Business Gap Analysis
88
● Outlines the specific measures to address each vulnerability ● Allocate resources ● Set up timelines for each remediation task that is needed
Plan of Action and Milestones (POA&M)
89
_____________demands verification for every device, user, and transaction within the network, regardless of its origin
Zero Trust
90
Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization
Control Plane
91
Control Plane typically encompasses 4 key elements
Adaptive Identity Threat Scope Reduction Policy-Driven Access Control Secured Zones
92
Relies on real-time validation that takes into account the user's behavior, device, location, and more
Adaptive Identity
93
Entails developing, managing, and enforcing user access policies based on their roles and responsibilities
Policy-Driven Access Control
93
Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface. Focused on minimizing the "blast radius" that could occur in the event of a breach
Threat Scope Reduction
94
Isolated environments within a network that are designed to house sensitive data
Secured Zones
95
Ensures the policies are properly executed
Data Plane
96
Data plane consists of the following
Subject/System Policy Engine Policy Administrator Policy Enforcement Point
97
Refers to the individual or entity attempting to gain access
Subject/System
98
Cross-references the access request with its predefined policies
Policy Engine
99
Used to establish and manage the access policies
Policy Administrator
99
Where the decision to grant or deny access is actually execute
Policy Enforcement Point