Chap 1 Flashcards
What is information security?
Protection of data resources from unauthorized access, attack, theft or damage.
What is the CIA Triad?
Properties of securing information:
- Confidentiality
- Integrity
- Availability
* Non-Repudiation
What is Confidentiality?
Certain information should only be known to certain people.
What is integrity?
When data is stored and transferred as intended and that any modification is authorized.
What is Availability?
Information is accessible to those authorized to view or modify it.
What is Non-repudiation?
A subject cannot deny doing something such as creating, modifying or sending a resource.
What are the five functions of Cybersecurity task according to NIST?
- Identify
- Protect
- Detect
- Respond
- Recover
What is Identify as a cybersecurity task function?
To develop security policies and capabilities.
What is protect as a function of cybersecurity task?
Procure/develop, install, operate and decommission IT hardware and software assets with security.
What is “detect” as a function of Cybersecurity task?
To perform ongoing, proactive monitoring to ensure that controls are effective and capable of protecting against new threats.
What is “Respond” as a function if cybersecurity task?
To identify, analyze, contain, and eradicate threats to systems and data security.
What is “recover” as a function of cybersecurity task.
To implement cybersecurity resilience to remote systems and data if other controls are unable to prevent attacks.
What is a security policy?
A security policy is a formalized statement that defines how security will be implemented within an organization.
What is a CSO/CISO
Chief Security Officer/ Chief Information Security Officer is the overall authority for internal security.
What is an ISSO
Information Systems Security Officer is a dedicated security admin.
Who as external responsibility for security (due care/liability)?
The owner/ director
All employees share some measure of responsibility. T/F?
True
What is a SOC?
A Security Operations Center is where critical information assets are monitored and protected across other business functions such as finance, operations, sales/marking and so on.
What is DevSecOps?
Development Security Operations is a form of development security operations that bridges the gap between developers and system administrators.
What is a CIRT/CSIRT/CERT?
Cyber incident response team, Computer security incident response team, or computer emergency response team is a single point of contact for notification of a security incident.