01 - Flash Cards
1
Q
Information
A
- Organization’s information is a term that refers to all the information pertaining to the organization.
2
Q
System
A
- In this context, systems refer to IT systems used to provide services.
3
Q
Devices
A
- Broad term that may refer to computing systems, servers, laptops, smartphones and external devices such as printers.
4
Q
Subject
A
- Active entities such as users that access passive object to gain information from or about an object.
5
Q
Object
A
- Passive entities such as files and databases that provide subject with information.
6
Q
CIA Triad
A
- Confidentiality
- Integrity
- Availability
7
Q
Confidentiality
A
- Is a concept that encompasses a set of measures used to protect the secrecy of data, resources, and objects.
8
Q
Integrity
A
- Ability to protect reliability and correctness of data/information.
9
Q
Availability
A
- Refers to uninterrupted access to objects to all authorized subjects.
10
Q
Types of Access Control
A
- Preventive Access Control
- Detective Access Control
- Corrective Access Control
- Deterrent Access Control
- Directive Access Control
- Compensating Access Control
- Administrative Access Control
- Logical/Technical Control
- Physical Control
11
Q
Preventive Access Control
A
- Type of control that attempts to prevent incidents before they occur – for example firewall or a guard.
12
Q
Detective Access Control
A
- Type of control that identifies security violations after they have occurred –for example motion detectors.
13
Q
Corrective Access Control
A
- Type of controls that change the environment after an incident has occured in order to to return it to normal – for example antivirus programs.
14
Q
Deterrent Access Control
A
- Type of a control that attempts to discourage specific action from happening- for example security cameras or a security policy.
15
Q
Directive Access Control
A
- Type of administrative control that provide guidelines – for example monitoring and supervision.
16
Q
Compensating Access Control
A
- Type of a control that provides an alternative when it is not possible to use a primary control.
17
Q
Administrative Access Control
A
- Type of controls that are stated in organization’s security policy – for example background checks and training efforts.
18
Q
Logical/Technical Control
A
- Hardware and software mechanisms used to manage access and to provide protection for systems.
19
Q
Physical Control
A
- Type of control one can physically touch – for example fences and guards.
20
Q
Identification
A
- Term that refers to a subject claiming an identity.
21
Q
Authentication
A
- Term that refers to verifying subject’s identity by comparing it against a database such as user accounts.
22
Q
Authorization
A
- Term that refers to granting access to specific resources based on a proven identity.
23
Q
Accountability
A
- Term that refers to subjects responsibility for their actions once an audit is under way.
24
Q
Authentication Factors Types
A
- Type 1
- Type 2
- Type 3
25
Q
Authentication Type 1
A
- Something you know – for example a pin or a password.
26
Q
Authentication Type 2
A
- Something you have – for example a token or a smart card.