1.2 Understanding and Applying Security Conepts Flashcards

Understand Security Concepts

1
Q

What is the Goal of Security in Business?

A

Implement Controls that Ultimately Increase the Value of Assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Focus of Securities Function?

A

Allow and Enable the Organization to achieve its goals and objectives | Increase the Organization’s value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What 5 Components Make up the CIA(AN) Triad?

A

Confidentiality | Integrity | Availability | Authenticity | Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Purpose of Confidentiality? Give and example.

A

To Protect Assets using Important Principles such as the need Need-to-Know and least privilege; prevents unauthorized disclosure. | Allowing access to databases to tech-team, not all teams such as finance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Purpose of Integrity? Give an example.

A

Protects and adds value to assets by making them more accurate, more timely, and more meaningful; prevents unauthorized of accidental changes to assets such as information. | Ensuring access controls are in place to prevent users from modifying others’ data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Purpose of Availability? Give an example.

A

Protects critical assets based on value to ensure organizational assets are available when required by stakeholders. | Ensuring an application has load-balancing to prevent DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Instead of “Goals of /Information/ Security”, What is a Better Term of the CIA Core Pillars of Security?

A

“Goals of Asset Security”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of Authenticity? | Give an example.

A

Proves assets are legitimate and bona fide, and verifies that they are trusted and verified. Proves the source and origin of important assets. | Use hashing to verify received content has not been modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Nonrepudiation? Give an example.

A

Provides assurance that someone cannot dispute the validity of something; the inability to refute accountability or responsibility. | Lot’s of logging to ensure traceability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly