Mastering Security Basics Flashcards

(30 cards)

1
Q

What is CIA triad?

A

CIA triad stands for Confidentiality, Integrity, and Availability. It’s a fundamental concept in information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Confidentiality

A

Confidentiality ensures that information is only accessible to those who are authorized to view it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Integrity.

A

Integrity ensures that data remains accurate, complete, and unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Availability.

A

Availability ensures that information and resources are accessible and usable when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Risk Management?

A

Risk Management is the process of identifying, assessing, and prioritizing risks followed by the coordinated application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Vulnerability?

A

A vulnerability is a weakness that could be exploited by a threat to breach security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Threat?

A

A threat is any potential danger to information or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Exploit.

A

An exploit is a piece of software, a chunk of data, or a sequence of commands that take advantage of a bug, glitch, or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four security Categories?

A

Technical, Managerial, Operational, Physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe technical controls

A

Use of technology such as hardware, software, and firmware to reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Managerial controls.

A

Administrative documents or policies to enforce security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide some examples of technical controls.

A

Encryption, Antivirus software, intrusion detection system (IDSs) and intrusion prevention systems (IPSs), Firewalls, Least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of Managerial controls

A

Risk assessment, vulnerability assessments,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Operational security controls.

A

Ensure daily operations and compliance of an organizations security plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provide some examples of operational security controls

A

Patrols, personnel security, awareness and training, configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe physical security controls.

A

Physical security controls are physical objects or items to deter unauthorized personnel from areas of data

17
Q

Provide some examples of physical security controls.

A

Bollards or other barricades, access control vestibules, lighting, signs, fences, sensors, cameras.

18
Q

What are the 6 controls types?

A

Preventative, deterrent, detective, corrective, compensating, and directive.

19
Q

What are some examples of preventative control types?

A

Firewalls, software applications, Access control list(ACL), security guards, intrusion prevention systems (IPSs), Patch Managment, Antivirus or anti-malware software,

20
Q

What is a preventative control?

A

Use of policies to mitigate or stop security risk before they occur.

21
Q

What is a deterrent control type?

A

Discourage or deter an attacker from carrying out unauthorized activities.

22
Q

What are some examples of deterrent controls

A

Warning or Security signs, login banners,

23
Q

What is a detective security control?

A

Identifies security events or breaches when they have already occurred.

24
Q

What are some examples of detective controls?

A

Security information event management (SIEM), log monitoring,security audit, Video Surveillance (CCTV), intrusion detection system (IDSs)

25
What is a corrective control?
Mitigates the impact of breaches or security events.
26
What are some examples of corrective controls?
Incident response plan (IRP), software patching,
27
What is a compensating control
Control that is Put in place as an alternative security method when existing ones no longer suffice.
28
Provide some examples of compensating controls.
Virtual Private Network (VPN), Encryption, Multi-factor Authentication (MFA),
29
Describe directive controls.
Security measure to establish clear rules and procedures on how to handle security events and incidents should they arise.
30
Provide some examples of Directive controls.
Acceptable Use Policy (AUP), password policies, change management.