SEC+ ch 1 - 4 Flashcards
(133 cards)
What is the definition of Information Security (InfoSec)?
Protection of data from unauthorized access, attacks, theft, or damage during storage, processing, or transmission.
What are the three components of the CIA Triad?
Confidentiality, Integrity, and Availability.
How is Confidentiality achieved in the CIA Triad?
Through encryption and access controls to ensure only authorized users can access the information.
What ensures Integrity in the CIA Triad?
Hashing and checksums to maintain data accuracy and prevent unauthorized alterations.
How is Availability maintained in the CIA Triad?
Through backups and redundancy to ensure information is accessible to authorized users when needed.
What is Non-repudiation in InfoSec?
Ensures users cannot deny actions they’ve taken, achieved with digital signatures and logs.
What are the five functions of the NIST Cybersecurity Framework (CSF)?
Identify, Protect, Detect, Respond, Recover.
What is Gap Analysis in Information Security?
A process to identify gaps between current security measures and recommended frameworks, resulting in a report with missing or misconfigured controls and steps for improvement.
What does Access Control determine in InfoSec?
How subjects (people, devices, systems) interact with objects (networks, files, databases).
What are the four IAM (Identity and Access Management) processes?
Identification, Authentication, Authorization, Accounting.
What does AAA stand for in Access Control?
Authentication, Authorization, Accounting.
What are Security Controls?
Processes, activities, or technologies used to ensure confidentiality, integrity, availability, and non-repudiation of data.
Name the four categories of Security Controls.
Managerial, Operational, Technical, Physical.
What is the primary focus of Managerial Security Controls?
Providing oversight of the system, including risk identification and evaluation.
What are Operational Security Controls?
Controls implemented by people, such as security guards and training programs.
Give examples of Technical Security Controls.
Firewalls, antivirus software, access control models.
What are Physical Security Controls?
Controls that deter access to premises or hardware, such as locks, alarms, and security cameras.
What are the Functional Types of Security Controls?
Preventive, Detective, Corrective, Directive, Deterrent, Compensating.
What is the purpose of Preventive Security Controls?
To eliminate or reduce the likelihood of an attack before it happens.
What do Detective Security Controls do?
Identify and record attempted or successful intrusions during an attack.
How do Corrective Security Controls function?
They eliminate or reduce the impact of an attack after it occurs.
What are Directive Security Controls?
They enforce rules of behavior, such as policies and standard operating procedures.
Define Deterrent Security Controls.
Controls that discourage an attacker psychologically, such as warning signs of penalties.
What are Compensating Security Controls?
Controls that substitute for a principal control to provide the same level of protection using a different method.