{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Lesson 1: Fundamental Security Concepts and Frameworks Flashcards

(46 cards)

1
Q

What is information security?

A

The practice of protecting data resources from unauthorized access, attacks, theft, or damage, ensuring confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is information security important?

A

It is crucial for maintaining trust and compliance with legal and regulatory requirements, safeguarding sensitive data from breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the CIA Triad stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of Confidentiality in information security?

A

Ensures that only authorized individuals can access sensitive information, often implemented through encryption and access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of Integrity in information security?

A

Guarantees that data is accurate and unaltered during storage and transmission, using techniques like checksums and hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the goal of Availability in information security?

A

Ensures that information is accessible to authorized users when needed, often supported by redundancy and failover systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Non-Repudiation?

A

A principle that ensures individuals cannot deny their actions, such as creating or modifying data, often implemented through digital signatures and logging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a cybersecurity framework?

A

Provides guidelines for securing processing hardware and software, ensuring a structured approach to managing cybersecurity risks.
It helps organizations establish a baseline for security practices and compliance with industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five functions of the NIST Cybersecurity Framework?

A
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the NIST Cybersecurity Framework, what is the purpose of Identify?

A

Develop security policies and evaluate risks to understand the organization’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the NIST Cybersecurity Framework, what is the purpose of Protect?

A

Implement measures to secure IT hardware and software throughout their lifecycle, including access controls and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the NIST Cybersecurity Framework, what is the purpose of Detect?

A

Monitor systems and controls to identify potential threats and vulnerabilities in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the NIST Cybersecurity Framework, what is the purpose of Respond?

A

Develop and implement response plans to analyze and eradicate threats effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the NIST Cybersecurity Framework, what is the purpose of Recover?

A

Restore systems and data after an attack, ensuring business continuity and minimal downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is gap analysis in the context of cybersecurity?

A

Identifies deviations between an organization’s current security systems and required framework standards, highlighting areas for improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose for doing a gap analysis?

A

It serves as a tool for organizations to objectively evaluate their cybersecurity capabilities and prioritize investments in security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What processes are involved in gap analysis?

A

Assessing existing controls against best practices and regulatory requirements, resulting in a report of deficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the expected outcome from a gap analysis?

A

The expected outcome is that recommendations for remediation are provided which will guide the organization on how to enhance their security posture effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Access Control?

A

Ensures that information systems align with the goals of the CIA triad, protecting sensitive data from unauthorized access.

20
Q

What are the key processes involved in Access Control?

A
  • Identification
  • Authentication
  • Authorization
  • Accounting
21
Q

In Access Control, what is the purpose of Identification?

A

Involves creating unique identifiers for users, devices, or processes to establish a baseline for access.

22
Q

In Access Control, what is the purpose of Authentication?

A

Verifies the identity of users through credentials such as passwords or digital certificates.

23
Q

In Access Control, what is the purpose of Authorization?

A

Determines and enforces access rights based on established models. (ex. Discretionary, Mandatory)

24
Q

In Access Control, what is the purpose of Accounting?

A

Involves tracking and monitoring authorized usage, alerting on any unauthorized access attempts.

25
What are the categories of security controls?
* Managerial Controls * Operational Controls * Technical Controls * Physical Controls
26
In Security Controls, what is the purpose of the Managerial Controls? Provide an example
Focus on oversight and risk management. (ex. Risk Assessments)
27
In Security Controls, what is the purpose of the Operational Controls? Provide an example
Primarily implemented by personnel. (ex. Training programs, Security Guards)
28
In Security Controls, what is the purpose of the Technical Controls? Provide an example
Enforced through technology. (ex. Firewalls, Antivirus Software)
29
In Security Controls, what is the purpose of the Physical Controls? Provide an example
Protect physical assets. (ex. Locks, Alarms)
30
What are the functional types of security controls?
* Preventive Controls * Detective Controls * Corrective Controls * Directive Controls * Deterrent Controls * Compensating Controls
31
For Security Control Functions, what is the purpose of the Preventive Controls? Provide an example
Aim to eliminate or reduce the likelihood of an attack. (ex. Firewalls, Antimalware)
32
For Security Control Functions, what is the purpose of the Detective Controls? Provide an example
Identify and record intrusions during an attack. (ex. Intrusion Detection Systems)
33
For Security Control Functions, what is the purpose of the Corrective Controls? Provide an example
Mitigate the impact of security breaches after they occur. (ex. Backup Systems)
34
For Security Control Functions, what is the purpose of the Directive Controls? Provide an example
Establish rules of behavior. (ex. Security Policies)
35
For Security Control Functions, what is the purpose of the Deterrent Controls? Provide an example
Discourage potential intrusions. (ex. Warning Signs)
36
For Security Control Functions, what is the purpose of the Compensating Controls? Provide an example
Provide alternative methods to achieve security objectives when primary controls are not feasible. (ex. Backup Generator)
37
What role is the CIO?
Chief Information Officer
38
Who is the Chief Information Officer (CIO)?
Holds overall responsibility for IT and security strategy within the organization.
39
What role is the CSO?
Chief Security Officer
40
What role is the CISO?
Chief Information Security Officer
41
What are the responsibilities of the Chief Security Officer (CSO) / Chief Information Security Officer (CISO)?
Manages dedicated security departments and oversees security initiatives.
42
What role do Managers play in information security?
Responsible for specific domains, ensuring compliance with security policies in their areas.
43
What is a Security Operations Center (SOC)?
Monitors and protects critical information assets, providing real-time threat detection and response.
44
What is the purpose of DevSecOps?
Integrates security practices into software development and deployment processes, ensuring security is prioritized throughout the lifecycle.
45
What is the function of incident response teams?
Handles security incidents and notifications, often organized into teams like CIRT, CSIRT, and CERT.
46
Fill in the blank: Non-repudiation is vital in _______ contexts.
legal