Chapter 01 - Todays Security Professional Flashcards
What is Confidentiality
Confidentiality ensures that unauthorized individuals are not able to gain access to sensitive data.
Name 3 cyber security objectives.
CIA:
* Confidentiality
* Integrity
* Availability
Integrity
Ensures that there is no unauthorized modifications to information or systems, either intentionally or unintentionally.
What is Availability
Ensures that info and systems are rready to meet the needs of legimitate users at the time those users request it.
Name some confidentiality security controls.
- Firewalls
- Access Control Lists
- Encryption
Name some Integrity controls.
- Hashing
- Integrity Monitoring Solutions
Name some availability controls.
- Fault tolerance
- Clustering
- Backups
________ occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
Security Incidents occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
Name the DAD triad
Disclosure
Alteration
Denial
_____ model explains the three key threats to cyber security efforts.
DAD triad model explains the three key threats to cyber security efforts.
_____ is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss.
Disclosure
_____ is the unauthorized modification of information and is a violation of the principle of integrity.
Alteration
_____ is the unintended disruption of an authorized users legitimate access to information.
Denial
Attackers who gain access to sensitive information and remote it from the organization are said to be performing _______.
Data exfiltration
We can categorize the potential impact of a security incident using the same categories that businesses generally use to describe any type of risk. The categories are ____, _____, _____, _____ and _____.
Financial, Reputational, Strategic, Operational, and Compliance
________ is the risk of monetary damage to the organization as the result of the data breach.
Financial
______ risk occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.
Reputational risk
________ is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.
Strategic Risk
_____ is risk to the organization’s ability to carry out its day-to-day functions. This may slow down business processes, delay delivery of customer orders, or require the implementation of time-consuming manual work-arounds to normally automated practices.
Operational Risk
_____ occurs when a security breach causes an organization to run afoul of legal or regulatory requirements.
Compliance Risk
______ requires that health-care providers and other covered entities protect the confidentiality, integrity and availability of protected health information (PHI).
HIPAA
HIPAA is an example of a ______ risk.
Compliance
Losing a laptop with new product development plans fits under _______ risk.
Strategic Risk
Name the three security control categories.
Technical, Operational and Managerial Controls.
______ enforce confidentiality, integrity and availability in the digital space. Examples include firewall rules.
Technical Controls
_____ include the processes that we put in place to manage technology in a secure manner.
Operational controls
______ are procedural mechanisms that focus on the mechanics of the risk management process.
Managerial controls
What security control is the following:
Firewall, Intrusion prevention system, encryption, and access control lists.
Technical Controls
What security control is the following:
Access Reviews, Log monitoring, and vulnerability management.
Operational Controls
What security control is the following:
“Periodic risk assessments, security planning exercises, and the incorporation of security into the organization’s change management, service acquisition, and project management practices. “
Managerial controls
____ controls intend to stop a security issue before it occurs.
Preventive Controls
___ controls identify security events that have already occurred. Example: Intrusion detection system.
Detective Controls
____ controls remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example.
Corrective Controls
____ controls seek to prevent an attacker from attempting to violating security policies.
Deterrent Controls
_____ controls are security controls that impact the physical world.
Physical controls
___ controls are controls designed to mitigate the risk associated with exceptions made to a security policy.
Compensating controls
Payment Card Industry Data Security Standard (PCI DSS) includes one of the most formal _______ control processes in use today.
Payment Card Industry Data Security Standard (PCI DSS) includes one of the most formal compensating control processes in use today.
Intrusion detection systems are ____ controls.
Detective Controls
Firewalls and encryption are _____ controls.
Preventive
Vicious guard dogs, barbed wire fences are an example of ______ control. (Not a physical control)
Deterrent control
Name the three states where data might exists:
- Data in Motion
- Data at Rest
- Data in processing
_______ technology uses mathematical algorithms to protect information from prying eyes, both while it is in transit over a network and while it resides on systems.
Encryption
_________ systems help organizations enforce information handling policies and procedures to prevent data loss and theft.
Data Loss Prevention (DLP)
______ systems uses software agents installed on systems that search systems for the presence of sensitive information.
Host based DLP
______ systems are dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information.
Network-based DLP systems
DLP systems detect sensitive information using two methods: _________ and/or _______.
pattern maching and/or digital watermarking
________ techniques seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.
Data minimization
The best way to achieve data minimization is through _______.
Destroying data
________ process removes the ability to link data back to an individual, reducing its sensitivity.
De-identification
An alternative to de-identifying data is transforming it into a format where the orginal information can’t be retrieved. This process is called _______.
Data Obfuscation
Name 3 tools that can assist with data obfuscation.
Hashing, Tokenization, and Masking
____ uses a function to transform a value in our dataset to a corresponding hash value.
Hashing
____ replaces sensitive values with a unique identifier using a lookup table.
Tokenization
_____ partially redacts sensitive information by replacing some or all sensitive fields with blank characters.
Masking