1. Today's Security Professional Flashcards

1
Q

CIA Triangle

A

The 3 Key Objectives of Cybersecurity:

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

Definition & Examples

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

Examples: Encryption, Firewalls, Access Control Lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

Definition & Examples

A

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

Examples: Hashing, Integrity Monitoring Solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

Definition & Examples

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

Examples: Backups, Clustering, Fault Tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DAD Triangle

A

The 3 Key Threats to Cybersecurity efforts:

Disclosure
Alteration
Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Technical Controls

Definition & Examples

A

Enforce CIA in the digital space.

Examples: Firewall rules, access control lists, IPS, and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operational Controls

Definition & Examples

A

The processes that we put into place to manage technology in a secure manner.

Examples: Access Reviews, Log Monitoring, Vulnerability Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Managerial Controls

Definition & Examples

A

Procedural mechanisms that focus on the mechanics of the risk management process.

Examples: Periodic Risk Assessments, Security Planning Exercises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Preventative Controls

Definition & Examples

A

Intend to stop a security issue before it occurs.

Examples: Firewalls, Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Detective Controls

Definition & Examples

A

Identify security events that have already occurred.

Example: IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Corrective Controls

Definition & Examples

A

Remediate security issues that have already occurred.

Example: Restoring backups after a Ransomware attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Deterrent Controls

Definition & Examples

A

Seek to prevent an attacker from attempting to violate security policies.

Examples: Vicious Guard Dogs, Barbed wire fences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Controls

Definition & Examples

A

Security Controls that impact the physical world.

Examples: Fences, Perimeter Lighting, Locks, Burglar Alarms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compensating Controls

Definition & Examples

A

Controls designed to mitigate the risk associated with exceptions made to a security policy.

Example: Having to run an outdated version but putting it on a less important network to compensate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DLP

A

Data Loss Prevention Systems:

Block data exfiltration attempts.
Help organizations enforce information handling policies and procedures to prevent data loss and theft.

Can Be: Host-Based DLP or Network DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Obfuscation

Definition & Examples

A

Transforming data into a format where the original format can’t be retrieved.

Examples: Hashing, Tokenization, Masking

17
Q

Hashing

A

Uses a hash function to transform a value in our dataset to a corresponding hash value.

18
Q

Tokenization

A

Replaces sensitive values with a unique identifier using a lookup table.

For example: Replacing a student ID with a randomly generated 10 digit number. We’d maintain a lookup table that allows us to convert back.

19
Q

Masking

A

Partially redacts sensitive information by replacing some or all sensitive fields with blank characters, such as an X or *