Fundamentals of Security Flashcards

(21 cards)

1
Q

Information Security

A

Protects data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Protects computers, servers, networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non-Repudiation

A

Guarantees action or event cannot be denied (digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIANA Pentagon

A

An extension of CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Triple A’s

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Control Categories

A

Technical
Managerial
Operational
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Control Types

A

Preventative
Deterrent
Detective
Corrective
Compensating
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero Trust Model

A

Trust no one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Control Plane

A

Adaptive Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Plane

A

Establish policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat

A

Anything that causes harm to technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability

A

Any weakness in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Management

A

Finding different ways to minimize likelihood of an outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Confidentiality

A

Protection of information from unauthorized access (Encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Masking

A

Making data inaccessible for unauthorized users

17
Q

Physical Security Measures

A

Ensure confidentiality of physical data (paper records)

18
Q

Integrity

A

Ensures Data accuracy (Hashing)

19
Q

Availability

A

Ensures information is available when needed by authorized users (Redundancy)

20
Q

Authentication

A

Ensures Individuals are who they say they are

21
Q

5 Types Of Factors

A

Knowledge- Something you know
Possession- Physical item
Inherence- Unique characteristic to authenticate
Action-Unique action to prove who they are
Location- Certain geographic