2.1 What is InfoSec Flashcards

1
Q

Defining Security: Security involves :
*

A

protecting assets from various threats, including cyberattacks and natural disasters, with a focus on the most likely risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Assets: Assets can be ______________or _____________ and both types require protection.
*

A

physical (like hardware) or intangible (like data),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Value: In modern computing environments, _____________________ often hold equal or greater value than physical assets.
*

A

logical assets (data and intellectual property)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of Information Security: Information security is about __________________________.
*

A

safeguarding information systems from unauthorized access and misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security vs. Usability: A secure system may be impractical; increasing security typically reduces __________, necessitating a balance between the two.
*

A

productivity;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cost vs. Value in Security: Security measures should be _________________ to the value of the asset being protected; excessive security for low-value items is inefficient.
*

A

proportional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defining Security Levels: Determining when a system is ______________ is complex; no single measure guarantees complete security.
*

A

secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identifying Insecurity: Examples of insecure practices include failing to apply _____________ or _______________; recognizing these helps mitigate risks.
*

A

updates or using weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Legal Standards for Security: _________ ___________ for security vary by industry and country; organizations must comply with relevant laws to avoid violations.
*

A

Legal frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Regulatory Examples: Specific regulations like _________ and __________ provide guidelines for what constitutes adequate security in various sectors.
*

A

PCI DSS; HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Models for Security Discussion: Having models like the CIA triad helps ______________ discussions around security concepts among professionals.
*

A

standardize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIA Triad Explanation: The CIA triad—______________ __________ ____________—serves as a foundational model for understanding information security.
*

A

confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

: ______________ involves protecting data from unauthorized access through various means at different levels.
*

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______________ ensures that data remains unchanged except by authorized users; mechanisms like permissions help maintain this principle.
*

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______________ ensures data is accessible when needed; disruptions can arise from various issues like attacks or system failures.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

*
CIA Triad Application: The CIA triad aids in ___________________ by highlighting potential breaches in confidentiality, integrity, or availability.
*

A

analyzing specific security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ______________expands on the CIA triad by including possession/control, authenticity, and utility for a more comprehensive understanding of security.
*

A

Parkerian hexad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This principle focuses on the _________________of data storage media and its implications for _____________ and ______________.
*

A

physical control ; confidentiality and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

______________ verifies that data originates from the correct source; _________________ can help enforce this principle.
*

A

Authenticity - digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____________ assesses how useful data is; it varies based on context and can impact how effectively data serves its purpose.
*

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Application of Models in Security Discussions: Both the __________ and __________________ provide frameworks for discussing potential security failures and necessary controls.
*

A

CIA triad , Parkerian hexad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Types of Attacks Overview: Attacks can be categorized into __________, _____________, _____________, and _____________, affecting different aspects of the CIA triad.
*

A

interception; interruption; modification; fabrication

23
Q

________________allows unauthorized access to data and primarily threatens _______________ through methods like eavesdropping or unauthorized file access.
*

A

Interception; confidentiality

24
Q

_______________ refers to stored data not currently being transferred, while______________is actively being transmitted; both require _______________.
*

A

Data at rest; data in motion ; protection measures like encryption.

25
Q

__________ attacks make assets unavailable or unusable, impacting ______________ primarily but potentially affecting __________ as well.
*

A

Interruption; availability; integrity

26
Q

____________________ attacks involve unauthorized changes to data or systems, threatening both __________ and __________ depending on context.
*

A

Modification; integrity; availability

27
Q

______________ involves creating false data or processes that compromise ____________ and may affect _____________ through resource consumption.

A

Fabrication; integrity; availability

28
Q
  • ______________ are potential sources of harm specific to certain environments; understanding them is crucial for effective risk management.
    *
A

Threats

29
Q

___________________ are weaknesses that threats can exploit; identifying them is essential for assessing risk levels in any environment.
*

A

Vulnerabilities

30
Q

____________ arises when there is both a threat and a corresponding vulnerability; it quantifies the likelihood of an adverse event occurring.
*

A

Risk

31
Q

Considerations in Risk Assessment: Some organizations consider _________ alongside risk to evaluate the potential consequences based on asset value during threat assessments.
*

A

impact

32
Q

Risk Management Overview: Risk management involves _____________ __________, assessing ____________and _____________, and implementing measures to ________ ___________ effectively.
*

A

identifying assets; threats and vulnerabilities, mitigate risks

33
Q

Identifying Assets Importance: Knowing what assets need protection is crucial; this task can become __________ in larger organizations with diverse hardware and software environments.
*

A

Identifying Assets Importance: Knowing what assets need protection is crucial; this task can become complex in larger organizations with diverse hardware and software environments.

34
Q

Identifying Threats Process: After identifying critical assets, organizations must ____________potential threats using _________________ for clarity.

A

Identifying Threats Process: After identifying critical assets, organizations must assess potential threats using established models like the CIA triad or Parkerian hexad for clarity.

35
Q

___________ assessment must consider relevant threats; not all ________________ pose equal risk based on their context within an organization’s operations.
*

A

Assessing Vulnerabilities Contextually: Vulnerability assessment must consider relevant threats; not all vulnerabilities pose equal risk based on their context within an organization’s operations.

36
Q

Evaluating _________ involves linking identified threats with corresponding vulnerabilities to determine _________ effectively.
*

A

risks; overall risk levels

37
Q

________________—physical, logical, and administrative—is essential for addressing identified risks associated with threats and vulnerabilities.
*

A

Implementing controls

38
Q

_____________ safeguard environments where systems operate; they include barriers like locks and guards that prevent unauthorized access to sensitive areas.
*

A

Physical controls

39
Q

_____________ protect systems through technical measures such as encryption and access controls that prevent unauthorized activities within networks.
*

A

Logical controls

40
Q

__________________consist of policies governing user behavior; their effectiveness relies on enforcement mechanisms to ensure compliance across the organization.
*

A

Administrative controls

41
Q

_____________________ are crucial for managing unexpected events efficiently; preparation helps ensure effective action during real incidents.
*

A

Incident response plans

42
Q

The incident response process includes______________, ___________, ____________, _____________, _____________, and post-incident activity phases for comprehensive management of incidents.
*

A

preparation; detection/analysis, containment; eradication; recovery;

43
Q

_____________ involves creating policies and training personnel ahead of incidents to enhance response effectiveness when emergencies arise.
*

A

Preparation

44
Q

__________ and _____________Phase Explained: This phase focuses on identifying incidents using tools like IDS or antivirus software while combining automated analysis with human judgment for accurate evaluation.
*

A

Detection and Analysis

45
Q

: ____________ aims to limit damage during an incident by isolating affected systems or implementing measures to prevent further harm from ongoing attacks.
*

A

Containment

46
Q

Eradication Phase Actions: Eradication involves removing __________ or other threats from affected systems while ensuring that similar issues do not recur across the environment during recovery efforts.
*

A

malware;

47
Q

____________ Phase Challenges: ___________ entails restoring systems to their previous state post-incident; it can be complex due to uncertainties about backup integrity or missing components during restoration efforts.
*

A

Recovery; Recovery

48
Q

Conducting ________________ helps organizations learn from events by analyzing causes and implementing improvements to prevent future occurrences effectively.
*

A

post-incident reviews

49
Q

______________involves creating multiple layers of defense against attacks; this strategy aims to __________ _________long enough for effective response actions to be initiated if breaches occur.
*

A

Defense in depth , delay attackers

50
Q

Effective________ ___________ should include protections at various levels—external network, internal network, host systems, applications, and data—to create robust barriers against potential intrusions.
*

A

defense strategies

51
Q

While defense in depth enhances security __________ against attacks, it cannot guarantee______________ ____________; its goal is timely _____________ rather than absolute immunity from breaches.
*

A

resilience; complete prevention; detection

52
Q

Password Management Strategies: Implementing strong password policies can_____ ____________ security by making it challenging for attackers to compromise accounts through _____ ____________ methods over time if complexity requirements are enforced consistently across users’ accounts

A

significantly enhance; brute force

53
Q

What is Identity Proofing? 3x

A
  • Not the same as authentication.
  • Before you give out credentials, you “Identity Proof” somebody.
  • Validates someone’s identity before credentials are issued
    o Driver’s License, Passport, etc
54
Q
A