Assets, Threats, and Vulnerabilities Flashcards

1
Q

Asset classification

A

The practice of labeling assets based on sensitivity and importance to an organization.

This helps prioritize security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset inventory

A

A catalog of assets that need to be protected.

It is essential for effective asset management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset management

A

The process of tracking assets and the risks that affect them.

It ensures that assets are secure and effectively utilized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data

A

Information that is translated, processed, or stored by a computer.

Data can be structured or unstructured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data at rest

A

Data not currently being accessed.

Examples include files stored on a hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data in transit

A

Data traveling from one point to another.

This includes data sent over the internet or a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data in use

A

Data being accessed by one or more users.

This is often the most vulnerable state of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information security (InfoSec)

A

The practice of keeping data in all states away from unauthorized users.

It encompasses various security measures and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Policy

A

A set of rules that reduce risk and protect information.

Policies guide the organization’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Procedures

A

Step-by-step instructions to perform a specific security task.

They ensure consistent execution of security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Regulations

A

Rules set by a government or other authority to control the way something is done.

Regulations can dictate compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Standards

A

References that inform how to set policies.

They provide a baseline for compliance and best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Likelihood x Impact = Risk

A

One way to interpret risk is to consider the potential effects that negative events can have on a business. A way to present this idea is with a specific calculation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Restricted, confidential, internal-only, and public

A

The 4 most common classification schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Restricted

A

Highest level classification scheme. This category is reserved for incredibly sensitive assets, like need-to-know information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidential

A

Second highest classification scheme. This scheme refers to assets whose disclosure may lead to a significant negative impact on an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Internal-only

A

Third highest classification scheme. This scheme describes assets that are available to employees and business partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Public

A

This is the lowest level classification scheme. These assets have no negative consequences to the organization if they’re released.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Risk register

A

A central record of potential risks to an organization’s assets, information systems, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Access controls

A

Security controls that manage access, authorization, and accountability of information.

Access controls are essential for protecting sensitive data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Algorithm

A

A set of rules used to solve a problem.

Algorithms are fundamental to programming and data processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Application programming interface (API) token

A

A small block of encrypted code that contains information about a user.

API tokens are commonly used for authentication in web services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asymmetric encryption

A

The use of a public and private key pair for encryption and decryption of data.

Asymmetric encryption enhances security by using two keys instead of one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Basic auth

A

The technology used to establish a user’s request to access a server.

Basic auth is a simple authentication scheme built into the HTTP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Bit

A

The smallest unit of data measurement on a computer.

A bit can be either 0 or 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Brute force attack

A

The trial and error process of discovering private information.

Brute force attacks are often used to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cipher

A

An algorithm that encrypts information.

Ciphers can be symmetric or asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cryptographic key

A

A mechanism that decrypts ciphertext.

Cryptographic keys are crucial for data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Cryptography

A

The process of transforming information into a form that unintended readers can’t understand.

Cryptography ensures the confidentiality and integrity of data.

30
Q

Data custodian

A

Anyone or anything that’s responsible for the safe handling, transport, and storage of information.

Data custodians play a vital role in data governance.

31
Q

Data owner

A

The person that decides who can access, edit, use, or destroy their information.

Data owners have the ultimate responsibility for data security.

32
Q

Digital certificate

A

A file that verifies the identity of a public key holder.

Digital certificates are essential for establishing secure communications.

33
Q

Encryption

A

The process of converting data from a readable format to an encoded format.

Encryption is critical for protecting sensitive information.

34
Q

Hash collision

A

An instance when different inputs produce the same hash value.

Hash collisions can lead to security vulnerabilities.

35
Q

Hash function

A

An algorithm that produces a code that can’t be decrypted.

Hash functions are used in data integrity verification.

36
Q

Hash table

A

A data structure that’s used to store and reference hash values.

Hash tables allow for efficient data retrieval.

37
Q

Identity and access management (IAM)

A

A collection of processes and technologies that helps organizations manage digital identities in their environment.

IAM is essential for maintaining security and compliance.

38
Q

Information privacy

A

The protection of unauthorized access and distribution of data.

Information privacy concerns are increasingly important in the digital age.

39
Q

Non-repudiation

A

The concept that the authenticity of information can’t be denied.

Non-repudiation ensures that a sender cannot deny sending a message.

40
Q

OAuth?

A

An open-standard authorization protocol that shares designated access between applications.

OAuth is widely used for securing APIs.

41
Q

Payment Card Industry Data Security Standards

A

What does PCI DSS stand for?

PCI DSS is a set of security standards designed to protect card information.

42
Q

Principle of least privilege

A

The concept of granting only the minimal access and authorization required to complete a task or function.

This principle helps minimize potential damage from security breaches.

43
Q

Public key infrastructure (PKI)?

A

An encryption framework that secures the exchange of online information.

PKI is essential for secure communications over the internet.

44
Q

Rainbow table

A

A file of pre-generated hash values and their associated plaintext.

Rainbow tables are used to crack password hashes.

45
Q

Salting

A

An additional safeguard that’s used to strengthen hash functions.

Salting helps prevent rainbow table attacks.

46
Q

Security assessment

A

A check to determine how resilient current security implementations are against threats.

Security assessments help identify vulnerabilities.

47
Q

Security audit

A

A review of an organization’s security controls, policies, and procedures against a set of expectations.

Security audits ensure compliance with regulations and standards.

48
Q

Security controls

A

Safeguards designed to reduce specific security risks.

Security controls can be technical, administrative, or physical.

49
Q

Separation of duties

A

The principle that users should not be given levels of authorization that would allow them to misuse a system.

This principle helps prevent fraud and errors.

50
Q

Session

A

A sequence of network HTTP basic auth requests and responses associated with the same user.

Sessions help maintain stateful interactions with users.

51
Q

Session cookie

A

A token that websites use to validate a session and determine how long that session should last.

Session cookies are essential for user experience in web applications.

52
Q

Session hijacking

A

An event when attackers obtain a legitimate user’s session ID.

Session hijacking is a serious security threat.

53
Q

Session ID

A

A unique token that identifies a user and their device while accessing a system.

Session IDs are crucial for tracking user sessions.

54
Q

Symmetric encryption

A

The use of a single secret key to exchange information.

Symmetric encryption is faster than asymmetric encryption but less secure.

55
Q

User provisioning

A

The process of creating and maintaining a user’s digital identity.

User provisioning is critical for effective identity management.

56
Q

Payment Card Industry Data Security Standards (PCI DSS)

A

A set of security standards formed by major organizations in the financial industry.

57
Q

Application programming interface

A

What does API stand for?

58
Q

Identity and access management

A

What does IAM stand for?

59
Q

Public key infrastructure

A

What does PKI stand for?

60
Q

Single Sign-On

A

What does SSO stand for?

61
Q

Data steward

A

The person or group that maintains and implements data governance policies set by an organization.

62
Q

Knowledge, ownership, and characteristic

A

What are three factors that can be used to authenticate a user?

63
Q

Knowledge

A

A factor used to authenticate a user:

something the user knows.

64
Q

Ownership

A

A factor used to authenticate a user:

something the user possesses.

65
Q

Characteristic

A

A factor used to authenticate a user:

something the user is.

66
Q

Single sign-on (SSO)

A

A technology that combines several different logins into one.

67
Q

Guest accounts, user accounts, service accounts, and privileged accounts.

A

What are the most common types of user accounts?

68
Q

Guest account

A

A type of account provided to external users who need to access an internal network, like customers, clients, contractors, or business partners.

69
Q

User account

A

A type of account assigned to staff based on their job duties.

70
Q

Service account

A

A type of account granted to applications or software that needs to interact with other software on the network.

71
Q

Privileged account

A

A type of account that elevates permissions or administrative access.