Lesson 1: Summarize Fundamental Security Concepts Flashcards

(44 cards)

1
Q

What is Information Security (infosec)?

A

Protecting data resources from unauthorized access, attack, theft, or damage

Ensures data confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA Triad stand for?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Confidentiality in the context of the CIA Triad.

A

Information can only be read by authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of Integrity in the CIA Triad?

A

Ensures data accuracy and trustworthiness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Availability in the CIA Triad ensure?

A

Information is accessible to authorized users when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Non-repudiation?

A

Ensures actions cannot be denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of Non-repudiation.

A

Legal documents, like wills, often require witnesses to confirm their execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five functions of the NIST Cybersecurity Framework?

A
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of the Identify function in cybersecurity framework?

A

Develop security policies and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Protect function in cybersecurity framework involve?

A

Ensure security is embedded in every stage of IT hardware and software lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the Detect function in cybersecurity framework?

A

Perform ongoing monitoring to ensure controls are effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Respond function in cybersecurity framework entail?

A

Address threats to systems and data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is involved in the Recover function of cybersecurity framework?

A

Restore systems and data after an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Gap Analysis?

A

Identifies deviations between current security systems and the requirements of a cybersecurity framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key purposes of a Gap Analysis?

A
  • Achieve compliance
  • Improve security
  • Highlight missing or poorly configured controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four categories of security controls?

A
  • Managerial
  • Operational
  • Technical
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary purpose of security controls?

A

Ensure systems and data assets maintain CIA triad and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Preventive Controls.

A

Eliminate or reduce the likelihood of an attack succeeding.

19
Q

What are Detective Controls used for?

A

Identify and record attempted or successful intrusions.

20
Q

What is the role of Corrective Controls?

A

Eliminate or reduce the impact of a security policy violation.

21
Q

What are Directive Controls?

A

Enforce rules of behavior, policies, and procedures.

22
Q

Define Deterrent Controls.

A

Psychologically discourage attackers.

23
Q

What are Compensating Controls?

A

Substitute for principal controls, providing equivalent or better protection.

24
Q

What is a Security Policy?

A

Formal statement outlining security implementation.

25
Who is responsible for the overall IT function and possibly security in an organization?
Chief Information Officer (CIO)
26
What is the responsibility of the Chief Security Officer (CSO) or Chief Information Security Officer (CISO)?
Management of a dedicated security department.
27
What role does Nontechnical Staff play in an organization's security?
Complying with policies and legislation.
28
What are the main activities involved in Risk Assessments and Testing?
* Participate in risk assessments * Security system testing * Make recommendations to improve security
29
What is the function of the Security Operations Center (SOC)?
Monitor and protect critical information assets.
30
Define DevSecOps.
An extension of DevOps that integrates security into every stage of software development.
31
What is the role of Incident Response teams?
Manage and respond to security incidents effectively.
32
What is the definition of Incident Response?
A dedicated team (CIRT/CSIRT/CERT) that acts as a single point of contact for security incident notifications. ## Footnote CIRT stands for Computer Incident Response Team, CSIRT stands for Computer Security Incident Response Team, and CERT stands for Computer Emergency Response Team.
33
What are the functions of an Incident Response team?
May be part of the SOC or an independent unit. ## Footnote SOC stands for Security Operations Center.
34
What is the role of an Incident Response team?
Manage and respond to security incidents effectively.
35
What is the primary purpose of a Security Operations Center (SOC)?
Centralized Monitoring: Protect critical assets.
36
What business functions does a Security Operations Center (SOC) support?
* Finance * Operations * Sales/Marketing
37
Why do large organizations typically have a Security Operations Center (SOC)?
Due to complexity and cost.
38
What does DevSecOps integrate into software development?
Security.
39
What does the term 'Shift Left' refer to in DevSecOps?
Early security considerations.
40
Who collaborates in a DevSecOps environment?
* Developers * Administrators * Security specialists
41
What are the benefits of implementing DevSecOps?
* Faster * Reliable * Secure software
42
What is a key characteristic of an effective Incident Response team?
Single Point of Contact for incident notifications.
43
What is the advantage of integrating security in software development?
More reliable software development with embedded security practices.
44