Blue Team Cybersecurity Foundations Flashcards
What does the term Security refer to in cybersecurity?
Security refers to the protection of information or systems from unauthorized access, disclosure, alteration, or destruction.
What is necessary to achieve “Security” for information and systems?
Security measures, also known as security controls.
What are the types of security controls?
What are the terms technical and non-technical controls related to?
What are examples of technical controls?
Firewalls and Antivirus software, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Data Leakage Prevention (DLS) Solutions are examples of which types of security controls?
What are examples of non-technical controls?
Administrative protocols such as background checks for new employees or security awareness training are forms of what kinds of security controls?
Programs that ask employees to understand the difference between phishing emails and regular emails, and learn what to do when a phishing email is received are a form of what kind of security control?
What might a Non-technical security control request of employees at a company?
What is the goal of having security measures in place?
Achieving Confidentiality, Integrity and Availability (The CIA Triad) is difficult without what in place?
What is the ultimate objective of having security in information systems or physical locations with information systems?
The target of security is to meet the CIA triad, what are some locations where the CIA Triad may be implemented?
What does the term Confidentiality refer to in cybersecurity?
Keeping information that would be damaging to the company or organization that wishes to have that information stay private, refers to which component of the CIA Triad?
What does the term Integrity refer to in cybersecurity?
Insuring the data stored within a system is not altered or tampered with, meaning no one can easily bypass the security controls and modify the data in an unauthorized manner, refers to which component of the CIA Triad?
What does the term Availability mean in cybersecurity?
Ensuring that data systems will be accessible to authorized individuals whenever they need access, by ensuring that we have backup systems, Business Continuity Planning (BCP), Incident Response Planning (IRP), and Incident Management Processes (IMP) to reduce adverse impact, relates to which term in CIA Triad?
If the CIA Triad is properly implemented, what is the result for the organization and end-users?
Security Assurance = Trust
If CIA are achieved in a system, what are the positive outcomes for an organization?
Authenticity- Data is accurate, true, and not altered
Non-repudiation- Trails are there, no one can deny what actions were committed in the system or by who.
These are both provided when which systems are implemented properly withing the cybersecurity framework of an organization?
Multi-factor authentication ensures which outcome of CIA Triad is present.
Nonrepudiation
What are three outcomes of having strong security systems?
Security assurance or “trust”, authenticity, and nonrepudiation are outcomes of what?
What is the job of a cybersecurity professional?
Achieve Confidentiality, Integrity, and Availability in computer information systems through Technical and Non-technical security control measures.