2.0a Security Principles Flashcards

Basic Security Principles

1
Q

Confidentiality

A

Ensuring sensitive data is only accessible to authorized individuals or entities and protected from unauthorized disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Maintaining the accuracy, consistency, and trustworthiness of data and information throughout it’s lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Ensuring information and resources are accessible and usable by authorized users when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

Verifying the identity of users, systems, or divices to ensure they are who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

Granting appropriate access rights and privileges to authorized users based on their roles and responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudiation

A

Ensuring the origin and receipt of information or transactions can be verified and parties cannot deny their involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defense in Depth

A

Implementing multiple layers of security controls to protect against various types of cyber threats and attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Least Privilege

A

Providing users with the minimum level of access necessary to perform their tasks, reducing the risk of unauthorized access or misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Separation of Duties

A

Assigning different tasks and responsibilities to different individuals to prevent any single person from having complete control over critical processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Auditability and Accountability

A

Keeping track of security events and actions, enabling traceability and accountability in case of security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defense in Breadth

A

Extending security controls across various layers and components of an IT system to provide comprehensive protection against diverse cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy

A

Ensuring the protection of individuals’ personal and sensitive information from unauthorized access or disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security by Design

A

Integrating security measures and considerations from the early stages of system design and development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incident Response

A

Having a well-designed and practiced plan to respond to security incidents promptly and effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Patch Management

A

Regularly applying security patches and updates to software and systems to address known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption

A

Using Cryptographic techniques to protect data from unauthorized access or tampering.

17
Q

Physical Security

A

Implementing measures to safeguard physical assets, such as servers, data centers, and devices, from theft or damage.

18
Q

Monitoring and Logging

A

Collecting and analyzing security logs and events to detect and respond to suspicious activities or breaches.

19
Q

Redundancy and Resilience

A

Building redundancy and resilience into critical systems to ensure continuity of operations in the face of disruptions

20
Q

User Education

A

Conducting cybersecurity awareness training for employees and users to promote safe online practices and reduce human-related security risks.

21
Q

Secure Software Development

A

Integrating secure coding practices and conduction regular security assessments during software development to minimize vulnerabilities

22
Q

Insider Threat Mitigation

A

Implementing measures to detect and prevent malicious activities from insiders, such as employees, contractors, or partners.

23
Q

Least Common Mechanism

A

Reducing the shared access to resources or data among users and applications to limit the potential impact of security breaches.

24
Q

Mobile Device Security

A

Implementing security measures to protect mobile devices such as smartphones and tablets, and the sensitive data they store or access.

25
Q

Clout Security

A

Applying security controls and best practices to secure data and applications hosted in cloud environments.

26
Q

Secure Remote Access

A

Implementing secure remote access solutions for employees and authorized users to connect to internal resources securely.

27
Q

Identity and Access Management (IAM)

A

Controlling and managing user access to systems and resources bases on their roles and permissions.

28
Q

Cyber Threat Hunting

A

Proactively searching for signs of cyber threats and intrusions within an organization’s network and systems.

29
Q

Disaster Recovery Planning (DRP)

A

Developing plans and procedures to recover IT systems and operations in case of a significant cybersecurity incident or disaster.

30
Q

Social Media Security

A

Education users about safe practices on social media platforms to prevent information leaks and social engineering attacks.