A1 Flashcards

1
Q

What are the three objective groups under COSO and what do they do?

A
  1. Compliance objectives
    based on adherence to governmental laws and compliance regulations. As it relates to cybersecurity, this includes compliance with industry standards such as NIST, HIPPA, and GDR.
  2. Operating objectives
    They focus on the effectiveness and efficiency of business operations.
    Include performance measures and safeguards that can help increase the likelihood that an organization’s IT assets are protected against cybersecurity threats and fraud.
  3. Reporting objectives\
    focus on transparency, reliability, timeliness, and trustworthiness as determined by standard setting bodies, regulators, and an organization’s own policies.
    Increasing the likelihood that cybersecurity controls are in place so that they do not affect internal and external financial and non-financial reporting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a VPN do?

A

Provides an encrypted communication tunnel across the internet that allows remote users secure access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a Pocket Switch network do?

A

Allows transmission of data across a shared network and not the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is digital inscription?

A

The broad idea of encoding a message and not really the specifics through where the information is being transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Need to Know?

A

Only given what they must know for the job.
Focuses on data needed to perform a job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Least Privilege?

A

Minimal authority is given.
The applications needed to perform the job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does NIST do?

A

Establish a zero-trust network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a digital signature?

A

Not very protective.
Electronic stamp of authentication that is usually encrypted and attached to a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are biometrics?

A

No Voice authentication!!
The use of human physical characteristics or impressions (Fasce recognition or fingerprints)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a token?

A

A Form of multifactor authentication where the token is what gives you that secondary PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is context-aware authentication?

A

Identifies devise’s location, time of access, and IP location so that people can’t access data outside of the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a digital Certificate?

A

A form of verification that works almost like a passport of license set up by the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Batch Processing?

A

Not a form of access control or denial just an information processor.
Batch processing procedures include collection and grouping of input documents/transactions by type of transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Defense-in-depth cybersecurity strategy?

A

Focuses on multilayer security containing more than one for of authentication not just technological but physical as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Identify NIST cybersecurity framework function do?

A

Supports the location and identification of vulnerabilities in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Discretionary access control?

A

Owners can grant access to others based on their own judgement or delegate tasks to other custodians as the owner sees fit.

16
Q

What is Role based access control?

A

Administer access based on a user’s job role instead of individually assigning permissions.

17
Q

What is a rule-based access control?

A

Access to areas, devices, or databases according to a predetermined set of rules or access permissions independent of the user’s role or position within the organization.

18
Q

What is an access control list (ACL)?

A

A list of rules that outlines which users have permission to access certain resources, such as a file, folder, directory, or other IT resource.

19
Q

What is asymmetric and symmetric encryption?

A

Asymmetric is when information is sent with a private key and a public key. (One to encrypt and another to decrypt)

Symmetric sends information with only a one key

20
Q

What is data obfuscation?

A

The process of replacing production data or sensitive information with data the is less valuable to unauthorized users.

21
Q

What is data masking?

A

A form of encryption that keeps the data in the same format but covers up a part of the data -*-4567

22
Q

What is data Tokenization?

A

Form of encryption when data is randomized, and a token can reverse it 1234 input key 5749.

23
Q

What is encryption?

A

The randomization of a data set that can be brought back to normal using a key.

24
Q

What is cypher?

A

The application of encryption algorithms.
result of applying encryption algorithms that encode unencrypted messages into an encrypted form.

25
Q

What is hashing?

A

Primarily used for data integrity verification.