Lesson 1: Summarize Fundamental Security Concepts Flashcards
(44 cards)
What is Information Security (infosec)?
Protecting data resources from unauthorized access, attack, theft, or damage
Ensures data confidentiality, integrity, and availability
What does the CIA Triad stand for?
- Confidentiality
- Integrity
- Availability
Define Confidentiality in the context of the CIA Triad.
Information can only be read by authorized individuals.
What is the purpose of Integrity in the CIA Triad?
Ensures data accuracy and trustworthiness.
What does Availability in the CIA Triad ensure?
Information is accessible to authorized users when needed.
What is Non-repudiation?
Ensures actions cannot be denied.
Give an example of Non-repudiation.
Legal documents, like wills, often require witnesses to confirm their execution.
What are the five functions of the NIST Cybersecurity Framework?
- Identify
- Protect
- Detect
- Respond
- Recover
What is the purpose of the Identify function in cybersecurity framework?
Develop security policies and capabilities.
What does the Protect function in cybersecurity framework involve?
Ensure security is embedded in every stage of IT hardware and software lifecycle.
What is the purpose of the Detect function in cybersecurity framework?
Perform ongoing monitoring to ensure controls are effective.
What does the Respond function in cybersecurity framework entail?
Address threats to systems and data security.
What is involved in the Recover function of cybersecurity framework?
Restore systems and data after an attack.
What is Gap Analysis?
Identifies deviations between current security systems and the requirements of a cybersecurity framework.
What are the key purposes of a Gap Analysis?
- Achieve compliance
- Improve security
- Highlight missing or poorly configured controls
What are the four categories of security controls?
- Managerial
- Operational
- Technical
- Physical
What is the primary purpose of security controls?
Ensure systems and data assets maintain CIA triad and non-repudiation.
Define Preventive Controls.
Eliminate or reduce the likelihood of an attack succeeding.
What are Detective Controls used for?
Identify and record attempted or successful intrusions.
What is the role of Corrective Controls?
Eliminate or reduce the impact of a security policy violation.
What are Directive Controls?
Enforce rules of behavior, policies, and procedures.
Define Deterrent Controls.
Psychologically discourage attackers.
What are Compensating Controls?
Substitute for principal controls, providing equivalent or better protection.
What is a Security Policy?
Formal statement outlining security implementation.