Fundamentals of Security Flashcards

(34 cards)

1
Q

What is Information Security?

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information Systems Security?

A

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the CIA Triad stand for?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Confidentiality in the CIA Triad.

A

Ensures information is accessible only to authorized personnel (e.g., encryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Integrity in the CIA Triad.

A

Ensures data remains accurate and unaltered (e.g., checksums).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Availability in the CIA Triad.

A

Ensures information and resources are accessible when needed (e.g., redundancy measures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Non-Repudiation?

A

Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the CIANA Pentagon?

A

An extension of the CIA triad with the addition of non-repudiation and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Triple A’s of Security?

A
  • Authentication
  • Authorization
  • Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Authentication?

A

Verifying the identity of a user or system (e.g., password checks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authorization?

A

Determining actions or resources an authenticated user can access (e.g., permissions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Accounting in security?

A

Tracking user activities and resource usage for audit or billing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the Security Control Categories.

A
  • Technical
  • Managerial
  • Operational
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List the types of Security Controls.

A
  • Preventative
  • Deterrent
  • Detective
  • Corrective
  • Compensating
  • Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Zero Trust Model?

A

Operates on the principle that no one should be trusted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two planes used in Zero Trust?

A
  • Control Plane
  • Data Plane
17
Q

Define Threat in the context of cybersecurity.

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems.

18
Q

What can be considered as sources of threats?

A
  • Natural disasters
  • Cyber-attacks
  • Data integrity breaches
  • Disclosure of confidential information
19
Q

Define Vulnerability.

A

Any weakness in the system design or implementation.

20
Q

What are internal factors contributing to vulnerabilities?

A
  • Software bugs
  • Misconfigured software
  • Improperly protected network devices
  • Missing security patches
  • Lack of physical security
21
Q

What is Risk Management?

A

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome.

22
Q

What are the five basic methods to ensure Confidentiality?

A
  • Encryption
  • Access Controls
  • Data Masking
  • Physical Security Measures
  • Training and Awareness
23
Q

What is Hashing?

A

Process of converting data into a fixed-size value.

24
Q

What is the importance of Integrity?

A
  • To ensure data accuracy
  • To maintain trust
  • To ensure system operability
25
What methods are used to maintain data integrity?
* Hashing * Digital Signatures * Checksums * Access Controls * Regular Audits
26
What is the role of Redundancy in Availability?
Duplication of critical components or functions of a system with the intention of enhancing its reliability.
27
What types of redundancy should be considered?
* Server Redundancy * Data Redundancy * Network Redundancy * Power Redundancy
28
What is the purpose of Digital Signatures?
Provide undeniable proof in digital transactions.
29
What are the 5 commonly used authentication methods?
* Something you know (Knowledge Factor) * Something you have (Possession Factor) * Something you are (Inherence Factor) * Something you do (Action Factor) * Somewhere you are (Location Factor)
30
What is Multi-Factor Authentication (MFA)?
Security process that requires users to provide multiple methods of identification to verify their identity.
31
What does Authorization pertain to?
Permissions and privileges granted to users or entities after they have been authenticated.
32
What is the purpose of Accounting?
Ensures all user activities during a communication or transaction are properly tracked and recorded.
33
What are the steps involved in conducting a Gap Analysis?
* Define the scope of the analysis * Gather data on the current state of the organization * Analyze the data to identify areas of shortfall * Develop a plan to bridge the gap
34
What is a Plan of Action and Milestones (POA&M)?
Outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for remediation tasks.