Unit 5 - Module 2 - Safeguards Flashcards

1
Q

What do you call safeguards designed to reduce specific security risks?

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 types of security controls?

A

Technical
Operational
Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the protection of unauthorized access and distribution of data?

A

Information Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who do you call the person that decides who can access, edit, use, or destroy their information?

A

Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anyone or anything that’s responsible for the safe handling, transport, and storage of information, what do you call them?

A

Data Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do you call the concept in which a user is only granted the minimum level of access and authorization required to complete a task or function?

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 ways of minimum lever of access inplemented?

A

1) Limiting access to sensitive information
2) Reducing the chances of accidental modification, tampering, or loss
3) Supporting system monitoring and administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 most common user accounts and what do they do?

A

Guest Account - Provided to external users who need to access an internal network, like customers, clients, contractors, or business partners

User Account - Assigned to staff based on their job duties

Service Account - Granted to application or software that needs to interact with other software on the network

Priviledge Accounts - Elevated permissions or administative access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When auditing accounts, what 3 common approaches are there?

A

Usage Audits
Privilege Audits
Account Change Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 stages of a data lifecycle? In order

A

Collect
Store
Use
Archive
Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the **3 data governance policies **that commonly categorize individuals into a specific role?

A

Data Owner - The person that decides who can access, edit, use, or destroy their information.
Data Custodian - Anyone or anything that’s responsible for the safe handling, transport, and storage of information.
Data Steward - The person or group that maintains and implements data governance policies set by an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 catagories or peoples sensitive information?

A

PII ( Personal Identifiable Information ) - Any information used to infer an individual’s identity. Info that can be used to contact or locate someone.
**PHI - ( Protected Health Information ) **- Information that relates to peoples health.
**SPII - (Sensitive Identifiable Personal Information) **- Bank account info, login information, ect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you call the protection of unauthorized access and distribution of data?

A

Information Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call the practice of keeping data in all states away from unauthorized users?

A

Information Security ( InfoSec )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What regulations are developed by the EU and puts data owners in total control of their personal information?

A

GDPR

( General Data Protection Regulation )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you call the security standards formed by major organizations in the financial industry? Securing credit and debit card transactions.

A

**PCI DSS **

( Payment Card Industry Data Security Standard )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What U.S law requires the protection of sensitive patient health information?

A

HIPAA

( Health Insurancce Protability and Accountability Act )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do you call the review of an organization’s security controls, policies, and procedures against a set of expections?

A

Security Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do you call seeing how resilient the current security implementation are against threats?

A

Security Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do you call the process of transforming information into a form that unintended readers can’t understand?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do you call a mechanism that decrypts ciphertext?

A

Cryptographic Key

22
Q

What do you call the encryption framework that secures the exchange of information online and establishes trust using digital certificates?

A

Public Key Infrastructure (PKI)

23
Q

What do you call the use of a public and private key pair for encryption and decryption of data?

A

Asymmetric Encryption

24
Q

What is a file that verifies the identity of a public key holder?

A

Digital Certificate

25
In public key infrastructure, what do you call the use of a **single secret key** to exchange information?
**Symmetic Encryption**
26
What is an algorithm that produces a code that **can't be decrypted**?
**Hash Function**
27
What do you call the concept that authenticity of information can't be denied?
**Non-Repudiation**
28
In hashing, what do you call it when the limited output size has **gone over** the exceed amount?
Hash Collision
29
What do you call a file of pre-generated hash values and their associated plaintext?
**Rainbow Table**
30
What do you call the safeguard that's used to strengthen hash functions?
**Salting**
31
What do you call security controls that manage access, authorization, and accountability of information?
**Access Controls**
32
What are 3 facotrs of authentication?
1) **Knowledge** - Something the user knows ( Their password or answer to questions ) 2) **Ownership** - Something the user possesses ( Multi factor authentication ) 3) **Characteristic** - Something the user is ( Finger prints scans )
33
What do you call a techonology that combines serveral different logins into one?
**Single sign-on** (SSO)
34
What do you call a security measure which requires a user to verify their identity in **two or more** ways to access a system or network?
Multi-Factor Authentication (MFA)
35
What protocol is mostly used to transmit information on-premises?
**LDAP** ( Lightweight Directory Access Protocol )
36
What protocol is mostly used to transmit information off-premises, like in the cloud?
**SAML** ( Security Assertion Markup Language )
37
What is the **AAA** Framwork? ( 3 Things )
Authentication Authorization Accounting
38
What is the principle that users should **not be given** levels of authorization that would allow them to misuse a system?
**Separation of Duties**
39
What is the techonology used to establish a user's request to access a server?
**Basic Auth**
40
What open-standard authorization protocol that shares designed access between applications? Also uses API tokens
**OAuth**
41
What do you call a small block of encrypted code that contains information about a user?
**API Token**
42
# What do you call A sequence of network HTTP basic auth requests and responces associated with the same user? ( When someone logs on and their acivitity is logged )
**Session**
43
# What do you call A unique token that identifies a user and their device while accessing the system?
**Session ID**
44
# What do you call A token that websites use to validate a session and determine how long that session should last?
**Session Cookie**
45
# What do you call An event when attackers obtain a legitimate user's sessions ID
46
# What do you call A collection of processes and technologies that helps organizations manage digital identities in their environment?
**Identity and Access Management** (IAM)
47
# What do you call The process of creating and maintaining a user's digital identity?
**User Provisioning**
48
What are the 3 frameworks that organizations use to help with **IAM**?
Mandatory Access Control (MAC ) Discretionary Access Control (DAC) Role-Based Access Control (RBAC)
49
What framework is created to manually grant information by a **central authority** or system administrator? Usually used in law enforments, military, and other government agencies.
**Mandatory Access Control (MAC)**
50
What access control is when a data owner decides appropriate levels of access?
**Discretionary Access Control (DAC)**
51
What authorization is determined by a user's role within an organziation?
Role-Based Access Control (RBAC)