2.1 What is InfoSec Flashcards

1
Q

Defining Security: Security involves :
*

A

protecting assets from various threats, including cyberattacks and natural disasters, with a focus on the most likely risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Assets: Assets can be ______________or _____________ and both types require protection.
*

A

physical (like hardware) or intangible (like data),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Value: In modern computing environments, _____________________ often hold equal or greater value than physical assets.
*

A

logical assets (data and intellectual property)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of Information Security: Information security is about __________________________.
*

A

safeguarding information systems from unauthorized access and misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security vs. Usability: A secure system may be impractical; increasing security typically reduces __________, necessitating a balance between the two.
*

A

productivity;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cost vs. Value in Security: Security measures should be _________________ to the value of the asset being protected; excessive security for low-value items is inefficient.
*

A

proportional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defining Security Levels: Determining when a system is ______________ is complex; no single measure guarantees complete security.
*

A

secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identifying Insecurity: Examples of insecure practices include failing to apply _____________ or _______________; recognizing these helps mitigate risks.
*

A

updates or using weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Legal Standards for Security: _________ ___________ for security vary by industry and country; organizations must comply with relevant laws to avoid violations.
*

A

Legal frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Regulatory Examples: Specific regulations like _________ and __________ provide guidelines for what constitutes adequate security in various sectors.
*

A

PCI DSS; HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Models for Security Discussion: Having models like the CIA triad helps ______________ discussions around security concepts among professionals.
*

A

standardize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIA Triad Explanation: The CIA triad—______________ __________ ____________—serves as a foundational model for understanding information security.
*

A

confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

: ______________ involves protecting data from unauthorized access through various means at different levels.
*

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______________ ensures that data remains unchanged except by authorized users; mechanisms like permissions help maintain this principle.
*

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______________ ensures data is accessible when needed; disruptions can arise from various issues like attacks or system failures.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

*
CIA Triad Application: The CIA triad aids in ___________________ by highlighting potential breaches in confidentiality, integrity, or availability.
*

A

analyzing specific security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ______________expands on the CIA triad by including possession/control, authenticity, and utility for a more comprehensive understanding of security.
*

A

Parkerian hexad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This principle focuses on the _________________of data storage media and its implications for _____________ and ______________.
*

A

physical control ; confidentiality and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______________ verifies that data originates from the correct source; _________________ can help enforce this principle.
*

A

Authenticity - digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____________ assesses how useful data is; it varies based on context and can impact how effectively data serves its purpose.
*

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Application of Models in Security Discussions: Both the __________ and __________________ provide frameworks for discussing potential security failures and necessary controls.
*

A

CIA triad , Parkerian hexad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Types of Attacks Overview: Attacks can be categorized into __________, _____________, _____________, and _____________, affecting different aspects of the CIA triad.
*

A

interception; interruption; modification; fabrication

23
Q

________________allows unauthorized access to data and primarily threatens _______________ through methods like eavesdropping or unauthorized file access.
*

A

Interception; confidentiality

24
Q

_______________ refers to stored data not currently being transferred, while______________is actively being transmitted; both require _______________.
*

A

Data at rest; data in motion ; protection measures like encryption.

25
__________ attacks make assets unavailable or unusable, impacting ______________ primarily but potentially affecting __________ as well. *
Interruption; availability; integrity
26
____________________ attacks involve unauthorized changes to data or systems, threatening both __________ and __________ depending on context. *
Modification; integrity; availability
27
______________ involves creating false data or processes that compromise ____________ and may affect _____________ through resource consumption.
Fabrication; integrity; availability
28
* ______________ are potential sources of harm specific to certain environments; understanding them is crucial for effective risk management. *
Threats
29
___________________ are weaknesses that threats can exploit; identifying them is essential for assessing risk levels in any environment. *
Vulnerabilities
30
____________ arises when there is both a threat and a corresponding vulnerability; it quantifies the likelihood of an adverse event occurring. *
Risk
31
Considerations in Risk Assessment: Some organizations consider _________ alongside risk to evaluate the potential consequences based on asset value during threat assessments. *
impact
32
Risk Management Overview: Risk management involves _____________ __________, assessing ____________and _____________, and implementing measures to ________ ___________ effectively. *
identifying assets; threats and vulnerabilities, mitigate risks
33
Identifying Assets Importance: Knowing what assets need protection is crucial; this task can become __________ in larger organizations with diverse hardware and software environments. *
Identifying Assets Importance: Knowing what assets need protection is crucial; this task can become complex in larger organizations with diverse hardware and software environments.
34
Identifying Threats Process: After identifying critical assets, organizations must ____________potential threats using _________________ for clarity.
Identifying Threats Process: After identifying critical assets, organizations must assess potential threats using established models like the CIA triad or Parkerian hexad for clarity.
35
___________ assessment must consider relevant threats; not all ________________ pose equal risk based on their context within an organization’s operations. *
Assessing Vulnerabilities Contextually: Vulnerability assessment must consider relevant threats; not all vulnerabilities pose equal risk based on their context within an organization’s operations.
36
Evaluating _________ involves linking identified threats with corresponding vulnerabilities to determine _________ effectively. *
risks; overall risk levels
37
________________—physical, logical, and administrative—is essential for addressing identified risks associated with threats and vulnerabilities. *
Implementing controls
38
_____________ safeguard environments where systems operate; they include barriers like locks and guards that prevent unauthorized access to sensitive areas. *
Physical controls
39
_____________ protect systems through technical measures such as encryption and access controls that prevent unauthorized activities within networks. *
Logical controls
40
__________________consist of policies governing user behavior; their effectiveness relies on enforcement mechanisms to ensure compliance across the organization. *
Administrative controls
41
_____________________ are crucial for managing unexpected events efficiently; preparation helps ensure effective action during real incidents. *
Incident response plans
42
The incident response process includes______________, ___________, ____________, _____________, _____________, and post-incident activity phases for comprehensive management of incidents. *
preparation; detection/analysis, containment; eradication; recovery;
43
_____________ involves creating policies and training personnel ahead of incidents to enhance response effectiveness when emergencies arise. *
Preparation
44
__________ and _____________Phase Explained: This phase focuses on identifying incidents using tools like IDS or antivirus software while combining automated analysis with human judgment for accurate evaluation. *
Detection and Analysis
45
: ____________ aims to limit damage during an incident by isolating affected systems or implementing measures to prevent further harm from ongoing attacks. *
Containment
46
Eradication Phase Actions: Eradication involves removing __________ or other threats from affected systems while ensuring that similar issues do not recur across the environment during recovery efforts. *
malware;
47
____________ Phase Challenges: ___________ entails restoring systems to their previous state post-incident; it can be complex due to uncertainties about backup integrity or missing components during restoration efforts. *
Recovery; Recovery
48
Conducting ________________ helps organizations learn from events by analyzing causes and implementing improvements to prevent future occurrences effectively. *
post-incident reviews
49
______________involves creating multiple layers of defense against attacks; this strategy aims to __________ _________long enough for effective response actions to be initiated if breaches occur. *
Defense in depth , delay attackers
50
Effective________ ___________ should include protections at various levels—external network, internal network, host systems, applications, and data—to create robust barriers against potential intrusions. *
defense strategies
51
While defense in depth enhances security __________ against attacks, it cannot guarantee______________ ____________; its goal is timely _____________ rather than absolute immunity from breaches. *
resilience; complete prevention; detection
52
Password Management Strategies: Implementing strong password policies can_____ ____________ security by making it challenging for attackers to compromise accounts through _____ ____________ methods over time if complexity requirements are enforced consistently across users' accounts
significantly enhance; brute force
53
What is Identity Proofing? 3x
* Not the same as authentication. * Before you give out credentials, you “Identity Proof” somebody. * Validates someone’s identity before credentials are issued o Driver’s License, Passport, etc
54