Unit 5 - Module 2 - Safeguards Flashcards

1
Q

What do you call safeguards designed to reduce specific security risks?

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 types of security controls?

A

Technical
Operational
Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the protection of unauthorized access and distribution of data?

A

Information Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who do you call the person that decides who can access, edit, use, or destroy their information?

A

Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anyone or anything that’s responsible for the safe handling, transport, and storage of information, what do you call them?

A

Data Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do you call the concept in which a user is only granted the minimum level of access and authorization required to complete a task or function?

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 ways of minimum lever of access inplemented?

A

1) Limiting access to sensitive information
2) Reducing the chances of accidental modification, tampering, or loss
3) Supporting system monitoring and administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 most common user accounts and what do they do?

A

Guest Account - Provided to external users who need to access an internal network, like customers, clients, contractors, or business partners

User Account - Assigned to staff based on their job duties

Service Account - Granted to application or software that needs to interact with other software on the network

Priviledge Accounts - Elevated permissions or administative access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When auditing accounts, what 3 common approaches are there?

A

Usage Audits
Privilege Audits
Account Change Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 stages of a data lifecycle? In order

A

Collect
Store
Use
Archive
Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the **3 data governance policies **that commonly categorize individuals into a specific role?

A

Data Owner - The person that decides who can access, edit, use, or destroy their information.
Data Custodian - Anyone or anything that’s responsible for the safe handling, transport, and storage of information.
Data Steward - The person or group that maintains and implements data governance policies set by an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 catagories or peoples sensitive information?

A

PII ( Personal Identifiable Information ) - Any information used to infer an individual’s identity. Info that can be used to contact or locate someone.
**PHI - ( Protected Health Information ) **- Information that relates to peoples health.
**SPII - (Sensitive Identifiable Personal Information) **- Bank account info, login information, ect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you call the protection of unauthorized access and distribution of data?

A

Information Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call the practice of keeping data in all states away from unauthorized users?

A

Information Security ( InfoSec )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What regulations are developed by the EU and puts data owners in total control of their personal information?

A

GDPR

( General Data Protection Regulation )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you call the security standards formed by major organizations in the financial industry? Securing credit and debit card transactions.

A

**PCI DSS **

( Payment Card Industry Data Security Standard )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What U.S law requires the protection of sensitive patient health information?

A

HIPAA

( Health Insurancce Protability and Accountability Act )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do you call the review of an organization’s security controls, policies, and procedures against a set of expections?

A

Security Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do you call seeing how resilient the current security implementation are against threats?

A

Security Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do you call the process of transforming information into a form that unintended readers can’t understand?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do you call a mechanism that decrypts ciphertext?

A

Cryptographic Key

22
Q

What do you call the encryption framework that secures the exchange of information online and establishes trust using digital certificates?

A

Public Key Infrastructure (PKI)

23
Q

What do you call the use of a public and private key pair for encryption and decryption of data?

A

Asymmetric Encryption

24
Q

What is a file that verifies the identity of a public key holder?

A

Digital Certificate

25
Q

In public key infrastructure, what do you call the use of a single secret key to exchange information?

A

Symmetic Encryption

26
Q

What is an algorithm that produces a code that can’t be decrypted?

A

Hash Function

27
Q

What do you call the concept that authenticity of information can’t be denied?

A

Non-Repudiation

28
Q

In hashing, what do you call it when the limited output size has gone over the exceed amount?

A

Hash Collision

29
Q

What do you call a file of pre-generated hash values and their associated plaintext?

A

Rainbow Table

30
Q

What do you call the safeguard that’s used to strengthen hash functions?

A

Salting

31
Q

What do you call security controls that manage access, authorization, and accountability of information?

A

Access Controls

32
Q

What are 3 facotrs of authentication?

A

1) Knowledge - Something the user knows ( Their password or answer to questions )
2) Ownership - Something the user possesses ( Multi factor authentication )
3) Characteristic - Something the user is ( Finger prints scans )

33
Q

What do you call a techonology that combines serveral different logins into one?

A

Single sign-on (SSO)

34
Q

What do you call a security measure which requires a user to verify their identity in two or more ways to access a system or network?

A

Multi-Factor Authentication (MFA)

35
Q

What protocol is mostly used to transmit information on-premises?

A

LDAP ( Lightweight Directory Access Protocol )

36
Q

What protocol is mostly used to transmit information off-premises, like in the cloud?

A

SAML ( Security Assertion Markup Language )

37
Q

What is the AAA Framwork? ( 3 Things )

A

Authentication
Authorization
Accounting

38
Q

What is the principle that users should not be given levels of authorization that would allow them to misuse a system?

A

Separation of Duties

39
Q

What is the techonology used to establish a user’s request to access a server?

A

Basic Auth

40
Q

What open-standard authorization protocol that shares designed access between applications? Also uses API tokens

A

OAuth

41
Q

What do you call a small block of encrypted code that contains information about a user?

A

API Token

42
Q

What do you call

A sequence of network HTTP basic auth requests and responces associated with the same user? ( When someone logs on and their acivitity is logged )

A

Session

43
Q

What do you call

A unique token that identifies a user and their device while accessing the system?

A

Session ID

44
Q

What do you call

A token that websites use to validate a session and determine how long that session should last?

A

Session Cookie

45
Q

What do you call

An event when attackers obtain a legitimate user’s sessions ID

A
46
Q

What do you call

A collection of processes and technologies that helps organizations manage digital identities in their environment?

A

Identity and Access Management (IAM)

47
Q

What do you call

The process of creating and maintaining a user’s digital identity?

A

User Provisioning

48
Q

What are the 3 frameworks that organizations use to help with IAM?

A

Mandatory Access Control (MAC )
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)

49
Q

What framework is created to manually grant information by a central authority or system administrator?

Usually used in law enforments, military, and other government agencies.

A

Mandatory Access Control (MAC)

50
Q

What access control is when a data owner decides appropriate levels of access?

A

Discretionary Access Control (DAC)

51
Q

What authorization is determined by a user’s role within an organziation?

A

Role-Based Access Control (RBAC)