Chapter 01 - Todays Security Professional Flashcards

1
Q

What is Confidentiality

A

Confidentiality ensures that unauthorized individuals are not able to gain access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 3 cyber security objectives.

A

CIA:
* Confidentiality
* Integrity
* Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Ensures that there is no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability

A

Ensures that info and systems are rready to meet the needs of legimitate users at the time those users request it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name some confidentiality security controls.

A
  • Firewalls
  • Access Control Lists
  • Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some Integrity controls.

A
  • Hashing
  • Integrity Monitoring Solutions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name some availability controls.

A
  • Fault tolerance
  • Clustering
  • Backups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________ occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.

A

Security Incidents occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the DAD triad

A

Disclosure
Alteration
Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ model explains the three key threats to cyber security efforts.

A

DAD triad model explains the three key threats to cyber security efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss.

A

Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is the unauthorized modification of information and is a violation of the principle of integrity.

A

Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ is the unintended disruption of an authorized users legitimate access to information.

A

Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attackers who gain access to sensitive information and remote it from the organization are said to be performing _______.

A

Data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

We can categorize the potential impact of a security incident using the same categories that businesses generally use to describe any type of risk. The categories are ____, _____, _____, _____ and _____.

A

Financial, Reputational, Strategic, Operational, and Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

________ is the risk of monetary damage to the organization as the result of the data breach.

A

Financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

______ risk occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.

A

Reputational risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

________ is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

A

Strategic Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____ is risk to the organization’s ability to carry out its day-to-day functions. This may slow down business processes, delay delivery of customer orders, or require the implementation of time-consuming manual work-arounds to normally automated practices.

A

Operational Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ occurs when a security breach causes an organization to run afoul of legal or regulatory requirements.

A

Compliance Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

______ requires that health-care providers and other covered entities protect the confidentiality, integrity and availability of protected health information (PHI).

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HIPAA is an example of a ______ risk.

A

Compliance

23
Q

Losing a laptop with new product development plans fits under _______ risk.

A

Strategic Risk

24
Q

Name the three security control categories.

A

Technical, Operational and Managerial Controls.

25
Q

______ enforce confidentiality, integrity and availability in the digital space. Examples include firewall rules.

A

Technical Controls

26
Q

_____ include the processes that we put in place to manage technology in a secure manner.

A

Operational controls

27
Q

______ are procedural mechanisms that focus on the mechanics of the risk management process.

A

Managerial controls

28
Q

What security control is the following:
Firewall, Intrusion prevention system, encryption, and access control lists.

A

Technical Controls

29
Q

What security control is the following:
Access Reviews, Log monitoring, and vulnerability management.

A

Operational Controls

30
Q

What security control is the following:
“Periodic risk assessments, security planning exercises, and the incorporation of security into the organization’s change management, service acquisition, and project management practices. “

A

Managerial controls

31
Q

____ controls intend to stop a security issue before it occurs.

A

Preventive Controls

32
Q

___ controls identify security events that have already occurred. Example: Intrusion detection system.

A

Detective Controls

33
Q

____ controls remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example.

A

Corrective Controls

34
Q

____ controls seek to prevent an attacker from attempting to violating security policies.

A

Deterrent Controls

35
Q

_____ controls are security controls that impact the physical world.

A

Physical controls

36
Q

___ controls are controls designed to mitigate the risk associated with exceptions made to a security policy.

A

Compensating controls

37
Q

Payment Card Industry Data Security Standard (PCI DSS) includes one of the most formal _______ control processes in use today.

A

Payment Card Industry Data Security Standard (PCI DSS) includes one of the most formal compensating control processes in use today.

38
Q

Intrusion detection systems are ____ controls.

A

Detective Controls

39
Q

Firewalls and encryption are _____ controls.

A

Preventive

40
Q

Vicious guard dogs, barbed wire fences are an example of ______ control. (Not a physical control)

A

Deterrent control

41
Q

Name the three states where data might exists:

A
  1. Data in Motion
  2. Data at Rest
  3. Data in processing
42
Q

_______ technology uses mathematical algorithms to protect information from prying eyes, both while it is in transit over a network and while it resides on systems.

A

Encryption

43
Q

_________ systems help organizations enforce information handling policies and procedures to prevent data loss and theft.

A

Data Loss Prevention (DLP)

44
Q

______ systems uses software agents installed on systems that search systems for the presence of sensitive information.

A

Host based DLP

45
Q

______ systems are dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information.

A

Network-based DLP systems

46
Q

DLP systems detect sensitive information using two methods: _________ and/or _______.

A

pattern maching and/or digital watermarking

47
Q

________ techniques seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.

A

Data minimization

48
Q

The best way to achieve data minimization is through _______.

A

Destroying data

49
Q

________ process removes the ability to link data back to an individual, reducing its sensitivity.

A

De-identification

50
Q

An alternative to de-identifying data is transforming it into a format where the orginal information can’t be retrieved. This process is called _______.

A

Data Obfuscation

51
Q

Name 3 tools that can assist with data obfuscation.

A

Hashing, Tokenization, and Masking

52
Q

____ uses a function to transform a value in our dataset to a corresponding hash value.

A

Hashing

53
Q

____ replaces sensitive values with a unique identifier using a lookup table.

A

Tokenization

54
Q

_____ partially redacts sensitive information by replacing some or all sensitive fields with blank characters.

A

Masking