Fundamentals of Security Flashcards

(26 cards)

1
Q

Fundamentals of Security

Information Security

Fundamentals of Security

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fundamentals of Security

Information Systems Security

Fundamentals of Security

A

Protecting the systems (computers, servers, network devices) that hold and process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fundamentals of Security

Confidentiality

CIA Triad:

Fundamentals of Security

A

Ensures information is accessible only to authorized personnel (e.g., encrytpion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fundamentals of Security

Integrity

CIA Triad:

Fundamentals of Security

A

Ensures data remains accurate and unaltered (e.g., checksums)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fundamentals of Security

Availability

CIA Triad:

Fundamentals of Security

A

Ensures information and resources are accessible when needed (e.g., redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fundamentals of Security

Non-Repudiation

Fundamentals of Security

A

Guarantees that an action or even cannot be denired by the involved parties (e.g., digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fundamentals of Security

CIANA Pentagon

Fundamentals of Security

A

Extension of the CIA Triad with the addition non-repudiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fundamentals of Security

Authentication

AAA’s of Security:

Fundamentals of Security

A

Verifying the identity of a user or system (e.g., password checks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fundamentals of Security

Authorization

AAA’s of Security:

Fundamentals of Security

A

Determining actions or resources am authenticated user can access (e.g., permissions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fundamentals of Security

Accounting

AAA’s of Security:

Fundamentals of Security

A

Tracking user activities and resource usage for audit or billing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fundamentals of Security

Security Control Categories

Fundamentals of Security

A
  • Technical
  • Managerial
  • Operational
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fundamentals of Security

Security Control Types

Fundamentals of Security

A
  • Preventative
  • Deterrent
  • Detective
  • Corrective
  • Compensating
  • Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fundamentals of Security

Zero Trust Model

Fundamentals of Security

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fundamentals of Security

Control Plane

Fundamentals of Security

A

Adaptive identity, threat scope reduction, policy driven access control, and secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fundamentals of Security

Data Plane

Fundamentals of Security

A

Subject/system, policy engine, policy administrator, and establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fundamentals of Security

Threat

Threats & Vulnerabilities

A

Anything that could cause harm, loss, damage, or compromise to our IT systems (External)

Can come from…
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information

17
Q

Fundamentals of Security

Vulnerability

Threats & Vulnerabilities

A

Any weakness IN the system design or implementation (Internal)

Can come from…
- Software bugs
- Misconfigured software
- Improperly protected network drives
- Missing security patches
- Lack of physical security

18
Q

Fundamentals of Security

Risk Management

Threats & Vulnerabilities

A

Finiding different ways to minimize the likelihood of an outcome and achieve the desired outcome

19
Q

Fundamentals of Security

Confidentiality

Confidentiality

A
  • The protection of information from unauthorized access and disclosure
  • Esure that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes
20
Q

Fundamentals of Security

Confidentiality is important for 3 reasons…

Confidentiality

A
  1. To protect personal privacy
  2. To maintain a business advantage
  3. To achieve regulatory compliance
21
Q

Fundamentals of Security

To ensure confidentiality, five basic methods are used…

Confidentiality

A
  1. Encyrption
  2. Access Controls
  3. Data Masking
  4. Physical Security Measures
  5. Training and Awareness
22
Q

Fundamentals of Security

Encryption

Five methods used to ensure confidentiality

Confidentiality

A

Process of converting data into a code to prevent unauthorized access

(Confidentiality = Encryption) !!

23
Q

Fundamentals of Security

Access Controls

Five methods used to ensure confidentiality

Confidentiality

A

By setting up strong user permissions, you can ensure that only authorized personnel can access certain types of data

(e.g., Username and Password)

24
Q

Fundamentals of Security

Physical Security Measures

Five methods used to ensure confidentiality

Confidentiality

A

Ensures confidentiality for both physical and digital types of data

(Locks on rooms containing servers/locking file cabinets)

24
# Fundamentals of Security Data Masking | Five methods used to ensure confidentiality ## Footnote Confidentiality
Involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data's authenticity and use for authorized users | (User's last 4 digits of a credit card number) (**** **** **** 1234)
25
# Fundamentals of Security Training & Awareness | Five methods used to ensure confidentiality ## Footnote Confidentiality
Conduct regular training on the security awareness best practices that employees can use to protect their organization's sensitive data