Fundamentals of Security Flashcards

(61 cards)

1
Q

Ensures information and resources are accessible when needed. (e.g., redundancy measures)

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ensures data remains accurate and unaltered. (e.g., checksums)

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ensures information is accessible only to authorized personnel. (e.g., encryption)

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data.

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Guarantees that an action or event cannot be denied by the involved parties

Example: digital signatures

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An extension of the CIA triad with the addition of non-repudiation and authentication.

A

CIANA Pentagon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication, Authorization, Accounting.

A

Triple A’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Verifying the identity of a user or system (e.g., password checks).

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Determining actions or resources an authenticated user can access (e.g., permissions).

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tracking user activities and resource usage for audit or billing purposes.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical, Managerial, Operational, Physical.

A

Security Control Categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Preventative, Deterrent, Detective, Corrective, Compensating, Directive.

A

Security Control Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operates on the principle that no one should be trusted by default.

A

Zero Trust Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adaptive identity, threat scope reduction, policy-driven access control, and secured zones.

A

Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Subject/system, policy engine, policy administrator, and establishing policy enforcement points.

A

Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Anything that could cause harm, loss, damage, or compromise to our information technology systems.

A

information technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some sources of threats?

A

Natural disasters, cyber-attacks, data integrity breaches, and disclosure of confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a vulnerability in a system?

A

Any weakness in the system design or implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some internal factors that can cause vulnerabilities?

A

Software bugs
Misconfigured software
Improperly protected network devices
Missing security patches
Lack of physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does Confidentiality refer to?

A

The protection of information from unauthorized access and disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is Confidentiality important?

A

It is important to protect personal privacy, maintain a business advantage, and achieve regulatory compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the five basic methods to ensure confidentiality?

A
  1. Encryption
  2. Access Controls
  3. Data Masking
  4. Physical Security Measures
  5. Training and Awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The process of converting data into a code to prevent unauthorized access.
Encryption
26
Setting up strong user permissions to ensure that only authorized personnel can access certain types of data.
Access Controls
27
a technique where sensitive information is replaced with fake data to protect confidentiality while still allowing data to be used for purposes like testing or analytics.
Data Masking
28
designed to protect physical assets, such as hardware, data centers, and network equipment, from unauthorized access, theft, or damage.
Physical Security Measures
29
educate individuals on identifying and avoiding cyber threats, promoting a safer online environment.
Training and Awareness
30
information and data remain accurate and unchanged from its original state
Integrity
31
What does integrity verify?
Accuracy and Trustworthiness of Data
32
Integrity is important for three main reasons:
1. To ensure data accuracy 2. To maintain trust 3. To ensure system operability.
33
Process of converting data into a fixed-size value.
hashing
34
They ensure both integrity and authenticity.
digital signatures
35
A method to verify the integrity of data during transmission.
checksum
36
Measures that ensure only authorized individuals can modify data, reducing the risk of unintentional or malicious alterations.
access controls
37
Systematically reviewing logs and operations to ensure that only authorized changes have been made, and addressing any discrepancies immediately.
regular audits
38
ensures that information, systems, and resources are accessible and operational when needed by authorized users.
availability
39
the practice of duplicating critical components or systems to ensure continuous operation and minimize downtime in the event of a failure
Redundancy
40
the practice of deploying duplicate servers and infrastructure components to minimize downtime and data loss
Server Redundancy
41
Involves storing data in multiple places
Data Redundancy
42
Ensures that if one network path fails, the data can travel through
Network Redundancy
43
Involves using backup power sources, like generators and UPS systems
Power Redundancy
44
a principle that prevents individuals from denying they performed a specific action or created a digital communication
Non-repudiation
45
Considered to be unique to each user who is operating within the digital domain
Digital Signatures
46
Non-repudiation is important for three main reasons
To confirm the authenticity of digital transactions To ensure the integrity of critical communications To provide accountability in digital processes
47
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction.
authentication
48
Relies on information that a user can recall.
Knowledge Factor
49
Relies on the user presenting a physical item to authenticate themselves.
Possession Factor
50
Relies on the user providing a unique physical or behavioral characteristic to validate their identity.
Inherence Factor
51
Relies on the user conducting a unique action to prove who they are.
Action Factor
52
Relies on the user being in a certain geographic location before access is granted.
Location Factor
53
Security process that requires users to provide multiple methods of identification to verify their identity.
Multi-Factor Authentication (MFA)
54
Authentication is critical to understand because of the following
■ To prevent unauthorized access ■ To protect user data and privacy ■ To ensure that resources are accessed by valid users only
55
Pertains to the permissions and privileges granted to users or entities after they have been authenticated
Authorization
56
Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded
Accounting
57
Provides achronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a source or point in time
Create an audit trail
58
Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks.
Technical Controls
59
Sometimes also referred to as administrative controls, they involve the strategic planning and governance side of security.
Managerial Controls
60
Procedures and measures that are designed to protect data on a day-to-day basis They are mainly governed by internal processes and human actions.
Operational Controls
61
Tangible, real-world measures taken to protect assets.
Physical Controls