1 Today's Security Professional Flashcards

1
Q

CIA

What are the three core objectives of cybersecurity?

A

confidentiality, integrity, and availability

Confidentiality ensures that unauthorized individuals are not able to gain access to sensitive information.

Integrity ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

Availability ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nonrepudiation means…

A

Nonrepudiation means that someone who performed some action, such as sending a message, **cannot later deny having taken that action. **

Digital signatures are a common example of nonrepudiation. They allow anyone who is interested to confirm that a message truly originated with its purported sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

their mechanism of action and their intent - TMOPs, 1P, 2Cs, 3Ds

Security controls and types?

A

Controls are grouped into the categories of
* managerial,
* operational,
* physical, and
* technical based on the way that they achieve their objectives.

Types:
* preventive,
* detective,
* corrective,
* deterrent,
* compensating, and
* directive
based on their intended purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does AAA stand for?

A

Authentication, Authorization, and Accounting (AAA) (Authenticating people, authenticating systems, authorization models)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Zero trust mean

A

Never trust, always verify
control plane, data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the DAD triad?

A

disclosure, alteration, and denial, maps to
CIA triad
CIA and DAD triads are very useful tools for cybersecurity planning and risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of risk? (FISOC)

A

Financial
Reputational
Identity Theft
Strategic Risk
Operational Risk
Compliance Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What approach would you take to Implementing Security Controls?

A

1) Gap analysis
review the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives.

Gaps identified during a gap analysis should be treated as potential risks and remediated as time and resources permit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the security control categories and types?

A

Preventive controls intend to stop a security issue before it occurs. Firewalls and encryption are examples of preventive controls.

Deterrent controls seek to prevent an attacker from attempting to violate security policies. Vicious guard dogs and barbed wire fences are examples of deterrent controls.

Detective controls identify security events that have already occurred. Intrusion detection systems are detective controls.

Corrective controls remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example of a corrective control.

Compensating controls are controls designed to mitigate the risk associated with exceptions made to a security policy.

Directive controls inform employees and others what they should do to achieve security objectives. Policies and procedures are examples of directive controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PCI DSS requirement

A

The Payment Card Industry Data Security Standard (PCI DSS) includes one of the most formal compensating control processes in use today. It sets out three criteria that must be met for a compensating control to be satisfactory:

The control must meet the intent and rigor of the original requirement.

The control must provide a similar level of defense as the original requirement, such that the compensating control sufficiently offsets the risk that the original PCI DSS requirement was designed to defend against.

The control must be “above and beyond” other PCI DSS requirements.

In many cases, organizations adopt compensating controls to address a temporary exception to a security requirement. In those cases, the organization should also develop remediation plans designed to bring the organization back into compliance with the literal meaning and intent of the original control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the states of data we need to protect?

A

Data at rest is stored data that resides on hard drives, tapes, in the cloud, or on other storage media. This data is prone to theft by insiders or external attackers who gain access to systems and are able to browse through their contents.

Data in transit is data that is in motion/transit over a network. When data travels on an untrusted network, it is open to eavesdropping attacks by anyone with access to those networks.

Data in use is data that is actively in use by a computer system. This includes the data stored in memory while processing takes place. An attacker with control of the system may be able to read the contents of memory and steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data encryption

A

Encryption technology uses mathematical algorithms to protect information from prying eyes, both while it is in transit over a network and while it resides on systems. Encrypted data is unintelligible to anyone who does not have access to the appropriate decryption key, making it safe to store and transmit encrypted data over otherwise insecure means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are DLP systems?

What is Agent-based DLP?

What is DRM?

A

Data loss prevention (DLP) systems help organizations enforce information handling policies and procedures to prevent data loss and theft. They search systems for stores of sensitive information that might be unsecured and monitor network traffic for potential attempts to remove sensitive information from the organization. They can act quickly to block the transmission before damage is done and alert administrators to the attempted breach.

DLP systems work in two different environments:

**Agent-based DLP

Agentless (network-based) DLP**

Agent-based DLP uses software agents installed on systems that search those systems for the presence of sensitive information. These searches often turn up Social Security numbers, credit card numbers, and other sensitive information in the most unlikely places!

Detecting the presence of stored sensitive information allows security professionals to take prompt action to either remove it or secure it with encryption. Taking the time to secure or remove information now may pay handsome rewards down the road if the device is lost, stolen, or compromised.

Agent-based DLP can also monitor system configuration and user actions, blocking undesirable actions. For example, some organizations use host-based DLP to block users from accessing USB-based removable media devices that they might use to carry information out of the organization’s secure environment.

Agentless (network-based) DLP systems are dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information. They can then block those transmissions, preventing the unsecured loss of sensitive information.

DLP systems may simply block traffic that violates the organization’s policy, or in some cases, they may automatically apply encryption to the content. This automatic encryption is commonly used with DLP systems that focus on email.

DLP systems also have two mechanisms of action:

Pattern matching, where they watch for the telltale signs of sensitive information. For example, if they see a number that is formatted like a credit card or Social Security number, they can automatically trigger on that. Similarly, they may contain a database of sensitive terms, such as “Top Secret” or “Business Confidential,” and trigger when they see those terms in an outbound transmission.

Watermarking, where systems or administrators apply electronic tags to sensitive documents and then the DLP system can monitor systems and networks for unencrypted content containing those tags.

Watermarking technology is also commonly used in digital rights management (DRM) solutions that enforce copyright and data ownership restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Minimization

A

Data minimization techniques seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis. The best way to achieve data minimization is to simply destroy data when it is no longer necessary to meet our original business purpose.

If we can’t completely remove data from a dataset, we can often transform it into a format where the original sensitive information is deidentified. The deidentification process removes the ability to link data back to an individual, reducing its sensitivity.

An alternative to deidentifying data is transforming it into a format where the original information can’t be retrieved. This is a process called data obfuscation, and we have several tools at our disposal to assist with it:

Hashing uses a hash function to transform a value in our dataset to a corresponding hash value. If we apply a strong hash function to a data element, we may replace the value in our file with the hashed value.

Tokenization replaces sensitive values with a unique identifier using a lookup table. For example, we might replace a widely known value, such as a student ID, with a randomly generated 10-digit number. We’d then maintain a lookup table that allows us to convert those back to student IDs if we need to determine someone’s identity. Of course, if you use this approach, you need to keep the lookup table secure!

Masking partially redacts sensitive information by replacing some or all sensitive fields with blank characters. For example, we might replace all but the last four digits of a credit card number with X’s or *’s to render the card number unreadable.

Although it isn’t possible to retrieve the original value directly from the hashed value, there is one major flaw to this approach. If someone has a list of possible values for a field, they can conduct something called a rainbow table attack. In this attack, the attacker computes the hashes of those candidate values and then checks to see if those hashes exist in our data file.

For example, imagine that we have a file listing all the students at our college who have failed courses but we hash their student IDs. If an attacker has a list of all students, they can compute the hash values of all student IDs and then check to see which hash values are on the list. For this reason, hashing should only be used with caution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of restriction

A

Access Restrictions
Access restrictions are security measures that limit the ability of individuals or systems to access sensitive information or resources. Two common types of access restrictions are geographic restrictions and permission restrictions:

Geographic restrictions limit access to resources based on the physical location of the user or system. For example, an organization may restrict access to a database to only those users located within a certain country or region. This can help to prevent unauthorized access from outside of the organization’s trusted network.

Permission restrictions limit access to resources based on the user’s role or level of authorization. For example, a company may grant access to financial data only to authorized personnel who have undergone appropriate background checks and training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Segmentation and Isolation

A

Organizations may also limit the access to sensitive systems based on their network location. Segmentation places sensitive systems on separate networks where they may communicate with each other but have strict restrictions on their ability to communicate with systems on other networks. Isolation goes a step further and completely cuts a system off from access to or from outside networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the categories of security controls?

A
  • Technical
  • Managerial
  • Operational
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List the types of security control.

A
  • Preventive
  • Deterrent
  • Detective
  • Corrective
  • Compensating
  • Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does the acronym CIA stand for in cybersecurity?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is non-repudiation?

A

A fundamental security concept ensuring that a party cannot deny the authenticity of their signature on a message or the sending of a message itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is gap analysis?

A

A method for assessing the difference between the current state and desired future state of security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the cryptographic solutions mentioned for data protection?

A
  • Obfuscation
  • Tokenization
  • Data masking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the general data considerations in security?

A
  • Data states
  • Data at rest
  • Data in transit
  • Data in use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What methods can be used to secure data?

A
  • Geographic restrictions
  • Encryption
  • Hashing
  • Masking
  • Tokenization
  • Obfuscation
  • Segmentation
  • Permission restrictions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the elements of the risk management process?

A
  • Risk identification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

True or False: Security professionals are responsible for protecting the availability of information systems.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Fill in the blank: The basic objectives of cybersecurity include ________, integrity, and availability.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the role of security professionals in an organization?

A

To protect the confidentiality, integrity, and availability of information and information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does the risk management process help security professionals to do?

A

Identify and mitigate risks to the organization’s information and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the three key objectives of cybersecurity programs?

A

Confidentiality, Integrity, Availability

These objectives are often referred to as the CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does confidentiality in cybersecurity ensure?

A

Unauthorized individuals cannot gain access to sensitive information.

Security controls such as firewalls, access control lists, and encryption are implemented to protect confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are some examples of security controls that protect confidentiality?

A
  • Firewalls
  • Access control lists
  • Encryption

These measures help prevent unauthorized access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does integrity in cybersecurity ensure?

A

No unauthorized modifications to information or systems.

Integrity controls include hashing and integrity monitoring solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are integrity threats?

A
  • Unauthorized alteration by attackers
  • Nonmalicious sources like power spikes

Integrity is crucial for maintaining the accuracy and trustworthiness of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does availability in cybersecurity ensure?

A

Information and systems are ready for legitimate users when needed.

Availability controls include fault tolerance, clustering, and backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are availability threats?

A
  • Attackers seeking disruption of access
  • Nonmalicious sources like natural disasters

These threats can prevent legitimate users from accessing necessary information or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the CIA triad in cybersecurity?

A

Confidentiality, Integrity, Availability

Cybersecurity analysts refer to these three goals when assessing risks and security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is nonrepudiation in the context of cybersecurity?

A

Assurance that someone cannot deny having performed an action.

Digital signatures are a common example of nonrepudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

True or False: Nonrepudiation is part of the CIA triad.

A

False

Nonrepudiation is an important goal but is not one of the three objectives in the CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Fill in the blank: The main components of the CIA triad security model are _______.

A

Confidentiality, Integrity, Availability

Understanding these components is essential for cybersecurity professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a security incident?

A

A breach of the confidentiality, integrity, and/or availability of information or information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the three main causes of security incidents?

A
  • Malicious activity
  • Accidental activity
  • Natural activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does the DAD triad represent?

A

The three key threats to cybersecurity: disclosure, alteration, and denial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does disclosure refer to in cybersecurity?

A

The exposure of sensitive information to unauthorized individuals, violating confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is data exfiltration?

A

When attackers gain access to sensitive information and remove it from the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What does alteration mean in the context of cybersecurity?

A

The unauthorized modification of information, violating integrity.

47
Q

What is denial in cybersecurity?

A

The disruption of an authorized user’s legitimate access to information, violating availability.

48
Q

What can cause denial events?

A
  • Intentional attacks (e.g., DDoS)
  • Accidental activity (e.g., server failure)
  • Natural activity (e.g., natural disasters)
49
Q

What are the five categories of potential impact from a security incident?

A
  • Financial
  • Reputational
  • Strategic
  • Operational
  • Compliance
50
Q

What is financial risk in the context of a data breach?

A

The risk of monetary damage to the organization as a result of a data breach.

51
Q

What is reputational risk?

A

The loss of goodwill among stakeholders due to negative publicity surrounding a security breach.

52
Q

Fill in the blank: The most common impact on individuals from a security breach is the risk of _______.

A

identity theft.

53
Q

What does strategic risk refer to?

A

The risk that an organization will become less effective in meeting its major goals and objectives due to a breach.

54
Q

What is operational risk?

A

Risk to the organization’s ability to carry out its day-to-day functions.

55
Q

What is compliance risk?

A

The risk of violating legal or regulatory requirements due to a security breach.

56
Q

True or False: A risk can only fit into one category.

57
Q

How can a data breach affect compliance risk?

A

By causing an organization to run afoul of legal or regulatory requirements, leading to potential sanctions.

58
Q

What is an example of compliance risk related to healthcare?

A

Violating HIPAA requirements by losing patient medical records.

59
Q

What is the purpose of control objectives in an organization?

A

To express the level of protection required to preserve confidentiality, integrity, and availability of information and systems.

60
Q

What are security controls?

A

Specific measures that fulfill the security objectives of an organization.

61
Q

What is a gap analysis in cybersecurity?

A

An evaluation of security controls to identify cases where they do not meet the control objectives.

62
Q

What should be done with gaps identified during a gap analysis?

A

They should be treated as potential risks and remediated as time and resources permit.

63
Q

What are the four categories of security controls?

A
  • Technical controls
  • Operational controls
  • Managerial controls
  • Physical controls
64
Q

What do technical controls enforce?

A

Confidentiality, integrity, and availability in the digital space.

65
Q

Give an example of a technical security control.

A

Firewall rules, access control lists, intrusion prevention systems, encryption.

66
Q

What do operational controls include?

A

Processes to manage technology in a secure manner, such as user access reviews and log monitoring.

67
Q

What is the focus of managerial controls?

A

The mechanics of the risk management process.

68
Q

Provide examples of physical security controls.

A
  • Fences
  • Perimeter lighting
  • Locks
  • Fire suppression systems
  • Burglar alarms
69
Q

What should organizations consider when selecting security controls?

A

Criteria and parameters imposed by their environment or outside regulators.

70
Q

What is an example of combining different control categories?

A

Preventing unauthorized access to a datacenter using biometric locks, user access reviews, and routine risk assessments.

71
Q

What are the types of security controls based on their desired effect?

A
  • Preventive controls
  • Deterrent controls
  • Detective controls
  • Corrective controls
  • Compensating controls
  • Directive controls
72
Q

What do preventive controls aim to do?

A

Stop a security issue before it occurs.

73
Q

What is an example of a deterrent control?

A

Vicious guard dogs or barbed wire fences.

74
Q

What do detective controls identify?

A

Security events that have already occurred.

75
Q

What is a corrective control?

A

Remediates security issues that have already occurred.

76
Q

What is the purpose of compensating controls?

A

To mitigate the risk associated with exceptions made to a security policy.

77
Q

What do directive controls inform employees about?

A

What they should do to achieve security objectives.

78
Q

What are the three criteria for a satisfactory compensating control according to PCI DSS?

A
  • Meet the intent and rigor of the original requirement
  • Provide a similar level of defense as the original requirement
  • Be ‘above and beyond’ other PCI DSS requirements
79
Q

What is an example of using a compensating control?

A

Running an outdated operating system on an isolated network to mitigate security risks.

80
Q

Why might organizations adopt compensating controls?

A

To address temporary exceptions to a security requirement.

81
Q

What should organizations develop alongside compensating controls?

A

Remediation plans to return to compliance with the original control requirements.

82
Q

What are the three states of data?

A

Data at rest, Data in transit, Data in use

83
Q

Define ‘data at rest’.

A

Stored data that resides on hard drives, tapes, in the cloud, or on other storage media

84
Q

What is ‘data in transit’?

A

Data that is in motion/transit over a network

85
Q

What does ‘data in use’ refer to?

A

Data that is actively in use by a computer system

86
Q

What is the primary purpose of data encryption?

A

To protect information from prying eyes while in transit or at rest

87
Q

True or False: Encrypted data is unintelligible to anyone with the appropriate decryption key.

88
Q

What do data loss prevention (DLP) systems do?

A

Help organizations enforce information handling policies and prevent data loss and theft

89
Q

List the two environments where DLP systems operate.

A
  • Agent-based DLP
  • Agentless (network-based) DLP
90
Q

Describe agent-based DLP.

A

Uses software agents installed on systems to search for sensitive information

91
Q

What is agentless (network-based) DLP?

A

Dedicated devices that monitor outbound network traffic for unencrypted sensitive information

92
Q

What are the two mechanisms of action used by DLP systems?

A
  • Pattern matching
  • Watermarking
93
Q

Define data minimization.

A

Techniques that seek to reduce the amount of sensitive information maintained regularly

94
Q

What is the main strategy for achieving data minimization?

A

Destroy data when it is no longer necessary

95
Q

What does deidentification do?

A

Removes the ability to link data back to an individual, reducing sensitivity

96
Q

Fill in the blank: The process of transforming data into a format where the original information can’t be retrieved is called _______.

A

data obfuscation

97
Q

What is hashing?

A

Using a hash function to transform a value into a corresponding hash value

98
Q

What is tokenization?

A

Replacing sensitive values with a unique identifier using a lookup table

99
Q

What is masking in the context of data protection?

A

Partially redacting sensitive information by replacing some fields with blank characters

100
Q

What are access restrictions?

A

Security measures that limit the ability to access sensitive information or resources

101
Q

Differentiate between geographic restrictions and permission restrictions.

A
  • Geographic restrictions limit access based on the physical location
  • Permission restrictions limit access based on the user’s role or authorization
102
Q

What is the purpose of segmentation in network security?

A

To place sensitive systems on separate networks with strict communication restrictions

103
Q

What does isolation mean in the context of data security?

A

Completely cutting a system off from access to or from outside networks

104
Q

What are the three main goals of cybersecurity professionals?

A

Confidentiality, integrity, and availability

These goals are collectively known as the CIA triad.

105
Q

What does confidentiality in cybersecurity ensure?

A

Unauthorized individuals cannot access sensitive information

This is crucial for protecting personal and organizational data.

106
Q

What is meant by integrity in the context of cybersecurity?

A

No unauthorized modifications to information or systems

Integrity encompasses both intentional and unintentional changes.

107
Q

Define availability in cybersecurity.

A

Information and systems are ready for legitimate users when needed

This ensures that services remain operational and accessible.

108
Q

What is the CIA triad?

A

A model that outlines the three main goals of cybersecurity: confidentiality, integrity, and availability

It serves as a framework for understanding and addressing security risks.

109
Q

What must cybersecurity analysts evaluate to protect their organizations?

A

Risks to the CIA triad

This involves assessing potential threats and vulnerabilities.

110
Q

What types of security controls should be implemented?

A

Managerial, operational, technical, and physical controls

Each category addresses different aspects of security.

111
Q

What are the types of controls that should be varied in a cybersecurity strategy?

A
  • Preventive
  • Detective
  • Corrective
  • Deterrent
  • Compensating
  • Directive

A diverse mix of controls enhances overall security posture.

112
Q

Fill in the blank: The goals of cybersecurity are known as the _______.

A

CIA triad

This acronym represents confidentiality, integrity, and availability.

113
Q

True or False: Availability means that sensitive information is always accessible to unauthorized users.

A

False

Availability refers to access for legitimate users, not unauthorized individuals.