Section 2 Fundamentals of Security Flashcards

(36 cards)

1
Q

What is a Threat?

A

Anything that could cause harm/damage/compromise to IT systems

Threats can be natural disasters, cyber attacks, or human errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Vulnerability.

A

Any weakness in the system design or implementation

Vulnerabilities can be software bugs, misconfigurations, or lack of security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the intersection of a threat and a vulnerability called?

A

Risk

Risk represents the potential for loss or damage when threats exploit vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Risk Management involve?

A

Finding different ways to minimize the likelihood of an outcome

This includes assessing risks and implementing controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Confidentiality in information security?

A

The protection of information from unauthorized access and disclosure

Ensuring confidentiality is crucial for sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Encryption?

A

Converting data into code to prevent unauthorized access (ciphertext)

Encryption is essential for protecting data in transit and at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: _______ is obscuring specific data within a database to make it inaccessible for unauthorized users.

A

Data Masking

An example of data masking is blocking out all numbers but the last 4 of a Social Security Number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Hashing?

A

Converts data into a fixed-size value; if any data changes, the hash value dramatically changes (hash digest)

Hashing is often used for data integrity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Digital Signatures?

A

File is hashed and then the hash digest is encrypted using the user’s private key. Alterations change the hash which invalidates the signature

Digital signatures ensure authenticity and integrity of digital messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of Checksums?

A

Used to verify the data being sent via transmission

Checksums compare the sender’s checksum for the transmitted data with the receiver’s calculated checksum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Redundancy in IT systems.

A

The duplication of critical components or functions of a system to enhance reliability

Types of redundancy include server, data, network, and power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Digital Signature?

A

Hashing a message, then encrypting the hash digest with user’s private key using asymmetric encryption

Asymmetric encryption uses a public and a private key for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Authentication confirm?

A

Confirms that people are who they say they are during a communication or transaction

Authentication methods include passwords, biometrics, and tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Authorization?

A

Determines permissions that are granted to users or entities after authentication

Authorization ensures users have the right access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Accounting in the context of IT security?

A

Monitors and logs the actions of users or entities during their digital transactions

This process helps in auditing and tracking user activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Audit Trail?

A

Chronological record of all user activities that can be used to trace any changes, unauthorized access, or anomalies back to a specific user or point in time

Audit trails are crucial for forensic analysis and compliance.

17
Q

What is a Syslog Server?

A

Server that aggregates logs from various network devices and systems

Syslog servers help in centralized log management.

18
Q

What does a Network Analyzer do?

A

A tool that captures and analyzes network traffic

Network analyzers are used for troubleshooting and monitoring network performance.

19
Q

What is a Security Information and Event Management (SIEM) System?

A

Provides real-time analysis of security alerts within the organization

SIEM systems aggregate and analyze security data from across the organization.

20
Q

Define Technical Controls.

A

Technologies, hardware, and software to manage and reduce risk

Examples include antivirus software, firewalls, and encryption.

21
Q

What are Managerial Controls?

A

Administrative controls such as risk assessment, security policies, training, and incident response programs

Managerial controls guide the overall security strategy of an organization.

22
Q

What are Operational Controls?

A

Day-to-day controls such as password changes, account reviews, etc.

Operational controls ensure the effectiveness of security policies on a daily basis.

23
Q

Define Physical Controls.

A

Physical, real-world controls such as document sharing and security guards

Physical controls protect assets and facilities from physical threats.

24
Q

What are Preventative Controls?

A

Proactive measures such as firewalls

Preventative controls aim to stop incidents before they occur.

25
What are Deterrent Controls?
Presents higher challenge for attackers, such as warning signs that monitoring is occurring ## Footnote Deterrent controls aim to discourage potential attackers.
26
What are Detective Controls?
Monitor & alert organizations to malicious activities during or shortly after the attack ## Footnote Examples include intrusion detection systems and alerts.
27
What are Corrective Controls?
After detection controls that mitigate potential damage and restore systems to normal states ## Footnote Corrective controls are essential for incident response.
28
What are Compensating Controls?
Alternative measures implemented when primary security controls are not feasible or effective ## Footnote Compensating controls provide a temporary solution to security gaps.
29
What are Directive Controls?
Guide, inform, or mandate different actions, such as policy and documentation that set standards of behavior within an organization ## Footnote Directive controls help establish a security culture.
30
What is The Zero Trust Model?
"Trust nothing and verify everything"—identity and permissions are always verified continuously ## Footnote The Zero Trust Model enhances security by assuming all entities may be compromised.
31
What is the Control Plane?
Provides a centralized way to dictate and control how, when, and where access is granted ## Footnote The Control Plane ensures only authenticated and authorized entities can access resources.
32
What is Adaptive Identity?
Limits users' access to only what they need for their tasks ## Footnote This minimizes the blast radius in the event of a breach.
33
What is Policy-Driven Access Control?
Developing/managing/enforcing user access policies based on roles and responsibilities ## Footnote This approach ensures users have appropriate access rights.
34
What are Secured Zones?
Isolated environments within a network designed to house sensitive data ## Footnote Only users with appropriate permissions can access these zones.
35
What is the Data Plane?
The subject or system and the policy enforcement point that executes decisions to grant or deny access ## Footnote The Data Plane is essential for implementing access control policies.
36
What is Gap Analysis?
Process of evaluating the differences between an organization's current performance and its desired performance ## Footnote Gap Analysis helps identify areas for improvement.