Blue Team Cybersecurity Foundations Flashcards

1
Q

What does the term Security refer to in cybersecurity?

A

Security refers to the protection of information or systems from unauthorized access, disclosure, alteration, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is necessary to achieve “Security” for information and systems?

A

Security measures, also known as security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the types of security controls?

A

What are the terms technical and non-technical controls related to?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of technical controls?

A

Firewalls and Antivirus software, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Data Leakage Prevention (DLS) Solutions are examples of which types of security controls?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of non-technical controls?

A

Administrative protocols such as background checks for new employees or security awareness training are forms of what kinds of security controls?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Programs that ask employees to understand the difference between phishing emails and regular emails, and learn what to do when a phishing email is received are a form of what kind of security control?

A

What might a Non-technical security control request of employees at a company?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the goal of having security measures in place?

A

Achieving Confidentiality, Integrity and Availability (The CIA Triad) is difficult without what in place?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the ultimate objective of having security in information systems or physical locations with information systems?

A

The target of security is to meet the CIA triad, what are some locations where the CIA Triad may be implemented?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the term Confidentiality refer to in cybersecurity?

A

Keeping information that would be damaging to the company or organization that wishes to have that information stay private, refers to which component of the CIA Triad?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term Integrity refer to in cybersecurity?

A

Insuring the data stored within a system is not altered or tampered with, meaning no one can easily bypass the security controls and modify the data in an unauthorized manner, refers to which component of the CIA Triad?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the term Availability mean in cybersecurity?

A

Ensuring that data systems will be accessible to authorized individuals whenever they need access, by ensuring that we have backup systems, Business Continuity Planning (BCP), Incident Response Planning (IRP), and Incident Management Processes (IMP) to reduce adverse impact, relates to which term in CIA Triad?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If the CIA Triad is properly implemented, what is the result for the organization and end-users?

A

Security Assurance = Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If CIA are achieved in a system, what are the positive outcomes for an organization?

A

Authenticity- Data is accurate, true, and not altered

Non-repudiation- Trails are there, no one can deny what actions were committed in the system or by who.

These are both provided when which systems are implemented properly withing the cybersecurity framework of an organization?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multi-factor authentication ensures which outcome of CIA Triad is present.

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three outcomes of having strong security systems?

A

Security assurance or “trust”, authenticity, and nonrepudiation are outcomes of what?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the job of a cybersecurity professional?

A

Achieve Confidentiality, Integrity, and Availability in computer information systems through Technical and Non-technical security control measures.