Module 11 - Understanding Defense Flashcards
(77 cards)
Which three foundational elements must cybersecurity analysts identify and secure to defend an organization’s network?
Assets, vulnerabilities and threats.
Which process groups an organization’s resources based on common characteristics to ensure appropriate protection levels?
Asset classification
Which term refers to anything of value to an organization that must be protected, such as servers, infrastructure, end devices, and data?
Assets
Which asset classification step involves determining the proper asset classification category such as Information assets, Software assets, Physical assets and Services?
Step 1
Which term describes any potential danger to an organizational asset?
A Threat
Which cybersecurity concept describes a weakness in a system or design that could be exploited by a threat actor?
A Vulnerability
What do assets collectively represent in terms of cybersecurity exposure to threat actors?
The organizations attack surface.
Which process involves inventorying all devices and information owned or managed by an organization, and implementing protection policies for them?
Asset management
What is the first step in the asset classification process, involving sorting assets into types such as information, software, physical, or services?
Step 1: Determining the proper asset identification category
Which type of asset classification step requires identifying owners for each piece of software and every information asset?
Step 2: Establishing asset accountability
Which step involves classification criteria might include sensitivity, business value, duration of relevance, and access restrictions?
Step 3: Determining criteria for classification
Which classification step involves adopting a consistent labeling system for identifying information and applying uniform protection?
Step 4: Implement a classification schema
Which term refers to identifying and enforcing consistency in hardware and software products across an organization to reduce complexity and improve maintenance?
Asset standardization
Which stage of the asset lifecycle includes assembling, inspecting for defects, testing, and tagging an asset before moving it to active use?
Deployment
Which asset classification step involves determining the criteria for classification based on Confidentiality, Value, Time, Access rights and Destruction?
Step 3
Which lifecycle phase involves monitoring performance, applying patches, renewing licenses, and conducting audits over time?
Utilization
Which asset lifecycle stage involves gathering justification data and adding the newly acquired item to inventory?
Procurement
Which stage aims to extend the productive life of an asset through upgrades or modifications?
Maintenance
In which phase of the asset lifecycle is data wiped, hazardous parts handled safely, and the asset dismantled or discarded?
Disposal
What type of vulnerability involves a threat actor impersonating a customer using stolen authentication tools like a PIN or smart card?
Phony transactions
What kind of vulnerability results from a legitimate user making an incorrect transaction or input?
Data input errors
What is the longest phase in an asset’s lifecycle, involving continuous performance checks and compliance-related actions?
Utiliazation
Which security approach uses multiple protective layers at the network edge, inside the network, and on endpoints to reduce the impact of a single security failure?
The Defense in depth approach
Which rare but devastating threat can result in the loss of all systems at a physical location?
Data center destruction