Security and Risk Management Flashcards

(17 cards)

1
Q

Nonrepudiation is made possible through what principles?

A

Identification, Authentication, Authorization, Accountability, and Auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the ultimate goal of threat modeling?

A

To Prioritize the potential threats against an organization’s valuable assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is security through obscurity?

A

The idea of not informing a subject that an object exists and hoping the subject will not find the object. It is not effective security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identification

A

The subject must provide an identity to a system to start the process of authentication, authorization, and accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality

A

Objects are not disclosed to unauthorized subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

Objects are intentionally modified by authorized subjects only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Availability

A

Authorized subjects are granted timely and uninterrupted access to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

Verifying that a claimed identity is valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization

A

The function of specifying the access rights/privileges

to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Governance

A

Practices related to supporting, defining, and directing the security efforts of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Auditing

A

Means by which subject are held accountable for their actions while authenticated on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why can auditing detect and be used for?

A
  • Unauthorized or abnormal behavior, attempted intrusions, system failures
  • Reconstruct events, evidence for a prosecution, problem reports and analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accountability

A

Subjects are held accountable for their actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 Types of Security Management Planning

A
  1. Strategic
  2. Tactical
  3. Operational
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Policy Structure

A

Security policy, baselines, guidelines, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Due Diligence

A
  • The act of investigating & understanding the risks the organization faces
  • Understanding the risks & threats
17
Q

Due Care

A
  • By developing security planning, policies, procedures, & standards, an organization is practicing due care
  • Implementing the countermeasures