Fundamentals of Security Flashcards

(47 cards)

1
Q

What is Information Security?

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information Systems Security?

A

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the CIA Triad stand for?

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Confidentiality?

A

Ensures information is accessible only to authorized personnel (e.g., encryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Integrity?

A

Ensures data remains accurate and unaltered (e.g., checksums).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Availability?

A

Ensures information and resources are accessible when needed (e.g., redundancy measures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Non-Repudiation?

A

Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the CIANA Pentagon?

A

An extension of the CIA triad with the addition of non-repudiation and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Triple A’s of Security?

A

Authentication, Authorization, Accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Authentication?

A

Verifying the identity of a user or system (e.g., password checks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authorization?

A

Determining actions or resources an authenticated user can access (e.g., permissions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Accounting?

A

Tracking user activities and resource usage for audit or billing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Security Control Categories?

A

Technical, Managerial, Operational, Physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the Security Control Types?

A

Preventative, Deterrent, Detective, Corrective, Compensating, Directive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Zero Trust Model?

A

Operates on the principle that no one should be trusted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Control Plane in Zero Trust?

A

Adaptive identity, threat scope reduction, policy-driven access control, and secured zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Data Plane in Zero Trust?

A

Subject/system, policy engine, policy administrator, and establishing policy enforcement points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Threat?

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Vulnerability?

A

Any weakness in the system design or implementation.

20
Q

What is Risk Management?

A

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome.

21
Q

What is Confidentiality in security?

A

Refers to the protection of information from unauthorized access and disclosure.

22
Q

Why is Confidentiality important?

A

To protect personal privacy, maintain a business advantage, and achieve regulatory compliance.

23
Q

What are methods to ensure Confidentiality?

A

Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness.

24
Q

What is Integrity in security?

A

Helps ensure that information and data remain accurate and unchanged from its original state.

25
Why is Integrity important?
To ensure data accuracy, maintain trust, and ensure system operability.
26
What are methods to maintain Integrity?
Hashing, Digital Signatures, Checksums, Access Controls, Regular Audits.
27
What is Availability in security?
Ensure that information, systems, and resources are accessible and operational when needed.
28
Why is Availability important?
Ensuring Business Continuity, Maintaining Customer Trust, Upholding an Organization's Reputation.
29
What is Redundancy?
Duplication of critical components or functions of a system to enhance its reliability.
30
What are types of Redundancy?
Server Redundancy, Data Redundancy, Network Redundancy, Power Redundancy.
31
What is Non-repudiation?
Focused on providing undeniable proof in the world of digital transactions.
32
What are Digital Signatures?
Unique to each user, created by hashing a message and encrypting it with the user’s private key.
33
Why is Non-repudiation important?
To confirm the authenticity of digital transactions, ensure integrity of communications, and provide accountability.
34
What is Authentication?
Ensures individuals or entities are who they claim to be during a communication or transaction.
35
What are common Authentication methods?
Something you know, Something you have, Something you are, Something you do, Somewhere you are.
36
What is Multi-Factor Authentication (MFA)?
Security process that requires users to provide multiple methods of identification.
37
Why is Authentication critical?
To prevent unauthorized access, protect user data and privacy, and ensure valid user access.
38
What is Authorization?
Pertains to the permissions and privileges granted to users after authentication.
39
Why are Authorization mechanisms important?
To protect sensitive data, maintain system integrity, and create a streamlined user experience.
40
What is Accounting?
Ensures all user activities during a communication or transaction are properly tracked and recorded.
41
What should a robust accounting system provide?
Create an audit trail, maintain regulatory compliance, conduct forensic analysis, perform resource optimization, achieve user accountability.
42
What are the 4 Broad Categories of Security Controls?
Technical Controls, Managerial Controls, Operational Controls, Physical Controls.
43
What are the 6 Basic Types of Security Controls?
Preventive Controls, Deterrent Controls, Detective Controls, Corrective Controls, Compensating Controls, Directive Controls.
44
What is Gap Analysis?
Process of evaluating the differences between an organization's current performance and its desired performance.
45
What are the steps involved in conducting a Gap Analysis?
Define the scope, gather data, analyze data, develop a plan to bridge the gap.
46
What are the 2 Basic Types of Gap Analysis?
Technical Gap Analysis, Business Gap Analysis.
47
What is the Plan of Action and Milestones (POA&M)?
Outlines specific measures to address each vulnerability, allocate resources, and set up timelines.