General Security Concepts Flashcards

(50 cards)

1
Q

Technical Controls

A

Controls implemented using hardware, software, and/or firmware.
Examples: Firewalls, anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Managerial Controls

A

Relate to risk management, governance, oversight, strategic alignment and decision making Examples: risk assessments, project management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational Controls

A

Aligned with a processes that are primarily implemented and executed by people.
Examples: change management, training, testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Controls

A

Designed to address physical interactions like connected to buildings.
Examples: gates, barricades, fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventive Control

A

Stop a threat agent from being successful
Examples: Firewall rules, security policy, security guard, door locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent Control

A

Discourage a threat agent from acting
Examples: posted warning signs, threat of demotion, splash screen, reception desk,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detective Control

A

Identify and report a threat agent or action
Examples: System logs, review login reports, patrol the property, motion detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Corrective Control

A

Minimize the impact of a threat agent or modify or fix a situation
Examples: Backups, fire extinguisher, policies for reporting issues, contact authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compensating Control

A

Controls implemented in lieu of a recommended control that provides comparable protection
Examples: Block instead of patch, separation of duties, require multiple security staff, power generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Directive Control

A

Proactive actions taken to cause/encourage a desirable event or outcome to occur
Examples: Trainings, policies, and authorized personnel only sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA Traid

A

Fundamentals of security
Confidentiality: prevents disclosure of information to unauthorized people or systems
Integrity: Information can’t be modified
Availability: Systems and networks must be up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Controls

A

Selectively restrict access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing

A

Map data of a length to data of a fixed length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital signatures

A

Math scheme to verify the integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Certificates

A

Combine with a digital signature to verify an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Non-Repuditation

A

Provides proof of integrity, can be asserted to be genuine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Redundancy

A

Build services that will always be available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fault tolerance

A

system will continue to run, even when a failure occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AAA

A

Authentication: Verifies a user and who they claim to be
Authorization: Determines if the user has permission to use a resource or access a file.
Accounting: Keeps track of a user’s activity on the system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Certificate Authority (CA)

A

Stores, signs, and issues digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Registration Authority (RA)

A

Verifies user requests for a digital certificate and tells the CA to issue it.

22
Q

Honeypot

A

Decoy server set up to trick an attacker

23
Q

Honeyfile

A

A decoy file deceptively named so it attracts the attention of an attacker

24
Q

Honeynet

A

A network of honeypots.

25
Honeytoken
A beacon embedded somewhere that can bait and track an attacker
26
Gap Analysis
The process of evaluating your org's current security posture and security framework
27
Least Privilege
Granting users only the access necessary to perform their job functions
28
Malware
Malicious software designed to harm, exploit, or compromise a system.
29
Defense in Depth
Implementing multiple layers of security controls to protect information.
30
Vulnerability Assessment
Process of identifying, quantifying, and prioritizing vulnerabilities in a system.
31
Zerto Trust Architecture
Security model that assumes no implicit trust and requires continuous verification.
32
Data Loss Prevention (DPL)
Strategies and tolls to prevent unauthorized access, use, or transmission of data
33
Public Key Infrastructure (PKI)
A framework for managing digital certificates and public key encryption
34
Symmetric Encryption
Encryption method where the same key is used for both encryption and decryption.
35
Asymmetric Encryption
Encryption method that uses a pair of keys a public key for encryption and a private key for decryption
36
Pharming
Cyberattack that redirects a website's traffic to a fraudulent website without a user's consent.
37
SQL Injection
Attack that involves inserting malicious SQL code into a query to a manipulate the database.
38
Cross Site Scripting
A vulnerability that allows attackers to inject malicious scripts into a web pages viewed by other users
39
Twofish
Symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.
40
Diffie-Hellman Key Exchange
Allows two parties to securely share a secret key over an unsecured communication channel
41
Mandatory Access Control (MAC)
Access control policy determined by a central authority, strictly enforcing access based on classifications
42
Discretionary Access Control (DAC)
Access control policy where the owner of the resource determines who has access
43
Role-Based Access Control (RBAC)
Access Control method where permissions are assigned to roles, and users are assigned to roles based on their responsibilities.
44
Demilitarized Zone (DMZ)
A physical or logical subnetwork that separates and internal LAN from untrusted external networks
45
Network Address Translation (NAT)
Translates private IP's to a public IP and vice versa to enable devices on a private network to access the internet
46
Virtual Land Area Network (VLAN)
Logical subdivision of a physical network designed to group devices, reduce traffic, and enhance security
47
Port Security
Network security feature on switches that limit access by controlling which devices can connect to specific ports based on their MAC address
48
ARP Spoofing
Attack where an attack sends ARP messages to associate their MAC address with a legit IP to intercept data
49
DHCP Snooping
Security Feature that prevents unauthorized or rouge DHCP servers from assigning IP's on a network by filtering DHCP messages and verifying trusted sources
50
SSL/TLS
Protocols used to secure communication over a network by encrypting data in transit, ensuring confidentiality, and Integrity