Chapter 1 Flashcards

1
Q

Define Cybersecurity

A

the protection of information assets by addressing threats to information processed, stored and transported by internetworked information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

protection from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

protection from unauthorized modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

protection from disruption to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define APT

A

Advanced Persistent Threats - attacks by adveraries with sophisticated levels of expertise and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5 Key Functions of Protecting Digital Assets

A
Identify
Protect
Detect
Respond
Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Identify

A

Use organizational understanding to minimize risk to systems, assets, data, and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Protect

A

Design safeguards to limit the impact of potential events on critical services and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Detect

A

Implement activities to identify the occurrence of a cybersecurity event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Respond

A

Take appropriate action after learning of a security event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Recover

A

Plan for resilience and the timely repair of compromised capabilities and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIA

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Method Controls for Confidentiality

A

Access Controls
File Permissions
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Method Controls for Integrity

A
Access Controls
Logging
Digital Signatures
Hashes
Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Method Controls for Availability

A

Redundancy
Backups
Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define nonrepudiation

A

when a piece of information is genuine

17
Q

How do you achieve nonrepudiation

A

use logs and digital signatures

18
Q

What are the three cybersecurity topics?

A

Governance
Risk Management
Compliance

19
Q

Who is responsible for governance?

A

the board of directors and senior management of the organization

20
Q

Goals of governance

A
  • Provide strategic direction
  • Ensure that objectives are achieved
  • Verify that the organization’s resources are being used responsibly
21
Q

Define Risk Management

A

The process by which an organization manages risk to acceptable levels

risk can be financial, physical or cyber

22
Q

Define Compliance

A

the act/ability of adhering to mandated requirements defined by laws and regulations

23
Q

Cybersecurity Roles

A

Board of Directors
Executive Committee
Security Management
Cybersecurity Practitioner