Section 2 Fundamentals of Security Flashcards
(36 cards)
What is a Threat?
Anything that could cause harm/damage/compromise to IT systems
Threats can be natural disasters, cyber attacks, or human errors.
Define Vulnerability.
Any weakness in the system design or implementation
Vulnerabilities can be software bugs, misconfigurations, or lack of security controls.
What is the intersection of a threat and a vulnerability called?
Risk
Risk represents the potential for loss or damage when threats exploit vulnerabilities.
What does Risk Management involve?
Finding different ways to minimize the likelihood of an outcome
This includes assessing risks and implementing controls.
What is Confidentiality in information security?
The protection of information from unauthorized access and disclosure
Ensuring confidentiality is crucial for sensitive data.
What is Encryption?
Converting data into code to prevent unauthorized access (ciphertext)
Encryption is essential for protecting data in transit and at rest.
Fill in the blank: _______ is obscuring specific data within a database to make it inaccessible for unauthorized users.
Data Masking
An example of data masking is blocking out all numbers but the last 4 of a Social Security Number.
What is Hashing?
Converts data into a fixed-size value; if any data changes, the hash value dramatically changes (hash digest)
Hashing is often used for data integrity verification.
What are Digital Signatures?
File is hashed and then the hash digest is encrypted using the user’s private key. Alterations change the hash which invalidates the signature
Digital signatures ensure authenticity and integrity of digital messages.
What is the purpose of Checksums?
Used to verify the data being sent via transmission
Checksums compare the sender’s checksum for the transmitted data with the receiver’s calculated checksum.
Define Redundancy in IT systems.
The duplication of critical components or functions of a system to enhance reliability
Types of redundancy include server, data, network, and power.
What is Digital Signature?
Hashing a message, then encrypting the hash digest with user’s private key using asymmetric encryption
Asymmetric encryption uses a public and a private key for encryption and decryption.
What does Authentication confirm?
Confirms that people are who they say they are during a communication or transaction
Authentication methods include passwords, biometrics, and tokens.
What is Authorization?
Determines permissions that are granted to users or entities after authentication
Authorization ensures users have the right access to resources.
What is Accounting in the context of IT security?
Monitors and logs the actions of users or entities during their digital transactions
This process helps in auditing and tracking user activities.
What is an Audit Trail?
Chronological record of all user activities that can be used to trace any changes, unauthorized access, or anomalies back to a specific user or point in time
Audit trails are crucial for forensic analysis and compliance.
What is a Syslog Server?
Server that aggregates logs from various network devices and systems
Syslog servers help in centralized log management.
What does a Network Analyzer do?
A tool that captures and analyzes network traffic
Network analyzers are used for troubleshooting and monitoring network performance.
What is a Security Information and Event Management (SIEM) System?
Provides real-time analysis of security alerts within the organization
SIEM systems aggregate and analyze security data from across the organization.
Define Technical Controls.
Technologies, hardware, and software to manage and reduce risk
Examples include antivirus software, firewalls, and encryption.
What are Managerial Controls?
Administrative controls such as risk assessment, security policies, training, and incident response programs
Managerial controls guide the overall security strategy of an organization.
What are Operational Controls?
Day-to-day controls such as password changes, account reviews, etc.
Operational controls ensure the effectiveness of security policies on a daily basis.
Define Physical Controls.
Physical, real-world controls such as document sharing and security guards
Physical controls protect assets and facilities from physical threats.
What are Preventative Controls?
Proactive measures such as firewalls
Preventative controls aim to stop incidents before they occur.