Chapter 1 Flashcards

1
Q

What are the 3 objectives in CS

A

Confidentiality, integrity and availability. - CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the confidentiality stand for

A

Confidentiality making sure only authorised personal are able to access the system/information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the integrity stand for

A

Making sure no unauthorized modifications are done both intentionally and unintentionally. They may try to utilise certain scenarios which can weaken the integrity of the system such as a power spike which can cause corruption of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the availability stand for

A

Ensuring that information and systems are ready to meet the needs of authorized personal whenever requested. Threats may come from attackers seeking to disrupt the access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give Examples of Confidentiality Controls

A

Security Controls are Firewalls, Access control lists and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give Examples of Integrity Controls

A

Hashing, integrity monitoring solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is hashing

A

Hashing is the practice of transforming a given key or string of characters into another value for the purpose of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give Examples of Availability Controls

A

Fault Tolerance, Clustering and backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is Fault Tolerance and Clustering

A

Fault Tolerance: is a process that enables an operating system to respond to a failure in hardware or software.

Clustering: Cluster analysis simply means grouping data points that are similar to each other and are found throughout the network in order to reveal hidden and unusual patterns of activity and detect cyber security attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the DAD triad stand for

A

Disclosure: Alteration: Denial. These are 3 different types of threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the Disclosure mean

A

The exposure of sensitive information to unauthorized personal AKA data loss. This violates the first part of the CIA triad (Confidentiality) Attackers may gain access to sensitive information can remove it from the organization which is known as data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Alteration

A

Unauthorized modification of data and violates integrity. Attackers may be using it to seek financial gain or modifying documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a bit flip

A

A natural activity causing a power surge which can cause a bit flip which modifies stored data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the denial stand for in DAD triad

A

Disruption of availability, Such as DDoS attack. This can happen accidently such as failure of critical server of natural activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Breach Impact

A

There are different types of incidents which may occur, Example: Financially, Reputational. Strategic, Operational and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Financial Risk

A

Monetary Damage to the company such as worker losing laptop or rebuilding data centre after its been destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Reputational Risk

A

How your public image will be, good will among customers, suppliers and stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is PII

A

Personally Identifiable Information(PII): Name, DOB, SSN, Passport data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Strategic Risk

A

Risk that an organization will become less effective in meeting its major goals and objectives due to breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Operational Risk

A

Risk to the organizations ability to carry out its day to day function. This can slow down businesses. Inefficiency/delay risk

21
Q

Define Compliance Risk

A

When a security breach causes an organization to run afoul or legal requirements. For example losing medical records can be sanctioned by fines.

22
Q

How are security controls implemented

A

Security Controls are Categorized based on the mechanism of action required and how will the objective be met.

23
Q

Name 3 different categories of security controls there are

A

Technical Controls, Managerial Controls, Operational Controls

24
Q

Define technical controls and give examples

A

Technical Controls: Enforce CIA in the digital space. Examples: Firewalls, access control lists, IPS (Intrusion Prevention systems) and encryption.

25
Q

Define Operational Controls and give examples :

A

Processes that we put in place to manage technology in a secure manner. Examples: User Access Reviews, Log monitoring and vulnerability management.

26
Q

Define Managerial Controls and give examples

A

Procedural mechanisms that focus on the mechanics of the risk management process, Examples: Admin Controls which could be risk assessments, security planning exercises. And including security into organizations change management, services acquisition and project management practices.

27
Q

How are security controls set out

A

Organisations select a set of security controls to meet their control objects based on the criteria and parameters. A company that deals with sensitive data may require the highest level of security controls.

28
Q

Define some security control types

A

Preventative Controls, Detective Controls, Corrective Controls, Physical Controls, Compensating Controls

29
Q

Define preventative controls

A

Stopping a security issue before it occurs Example Firewall/Encryption

30
Q

Define detective controls

A

Identify security events that have occurred. IDS (intrusion detection systems) are detective controls.

31
Q

Define Physical Controls

A

Physical security: CCTV, lock doors, lighting, burglar alarms.

32
Q

Define Compensating controls

A

Controls designed to mitigate the risk associated with exceptions made to a security policy.

33
Q

Give an example of a compensating control used today

A

The payment card industry data security standard (PCI DSS) is one of the most formal compensating control processes used today.

34
Q

What are the 3 criterias must be met for CC to be satisfactory

A

The control must meet the intent and rigor of the original requirements

The control must provide a similar level of defense as per the original requirements.

The control must be above and beyond other PCI Dss requirements

35
Q

Define Compensating Controls

A

Finding an alternative to achieve an objective when the organization cannot meet the original requirements. It is used as a temporary exception to a security requirement. Plans are made to reinsure compliance of original controls after.

36
Q

Define Data Protection

A

The security of data, Loss can have a wide range of impact.

37
Q

Name 3 states where data might exist

A

Data in Motion: Transit of data over a network, when data travels in a vulnerable network it is open to eavesdropping attacks by anyone who have access to the networks.

Data in processing: Data which is actively being used by a computer system. This includes the data stored in memory while processing takes place. An attacker with control of system may be able to read its content

Data in Motion: Transit of data over a network, when data travels in a vulnerable network it is open to eavesdropping attacks by anyone who have access to the networks.

38
Q

Name Some Security Controls Used to safeguard Data

A

Data Encryption: Mathematical algorithms to protect info, this can be done while in transit or when at rest. Cannot be read by people who don’t have the correct decryption key.

Data Loss Prevention (DLP): This helps organisations enforce info handling policies and procedures to prevent data theft/loss. This searches systems which may be unsecure and blocks the transmission before damage is done to the system. It alerts the admins to the type of breach.

39
Q

2 ways a DLP system works

A
  • Host based DLP
  • Network DLP
40
Q

Define Host based DLP

A

Host based DLP uses software agents installed on system that search those systems for presences of sensitive information. Examples SSN, CC numbers, Once detected security professionals can take the correct action. You can also monitor system configuration and user actions and able to block certain actions from being taken.

Example: Organization takes action to stop usage of USB devices to stop information being stolen.

41
Q

Define Network Based DLP

A

Network Based DLP systems block traffic that violates the organization’s policies, they may automatically apply encryption to the content. This is normally used in DLP systems that focus on email.

42
Q

Name 2 actions taken in NBDLP

A

Pattern Matching: Watch for signs of sensitive information, example seeing numbers formatted like a CC or SSN, they can automatically trigger on that. Or if they detect words like confidential or secure, they may automatically take action.

Watermarking: Where systems or administrators apply electronic tags to sensitive documents and then DLP systems can monitor systems and networks for unencrypted content containing those words. This is normally used with copyright and data ownership restrictions.

43
Q

Define data minimisation

A

Reducing the amount of sensitive one maintains. Best practice of doing this is data minimisation which is destroying data you no longer need.

If one cannot destroy the data then you can transform it into a format where the original sensitive information is de identified. This removes the ability for the data to link to someone.

44
Q

What is data obfuscation

A

is turning it into a format where the original cant be retrieved.

45
Q

Give an example of data obfuscation

A

Hashing: uses hash function to transform a value in our dataset to a corresponding hash value. A negative to using hashing is that it is prone to rainbow table attack. In this attack the attacker computes the hashes of those candidate values and then checks to see if those hashes exist in our data file.

Tokenization: Replaces sensitive values with unique identifier using lookup table. Examples replace a widely known value such as Student ID with a random 10 digit number. These 10 digits can be converted back into student ID original value.

Masking: Redacts sensitive information by replacing some or all sensitive fields with blank characters. Examples replace all but last 4 digits of CC number with X’s or *s to render the Card number unreadable.

46
Q

Tina is tuning her organizations intrusion prevention system to prevent false positive alerts. What type of control is Tina implementing?

A

Technical Control

47
Q

Tony is reviewing the status of his organization’s defense against a breach of their file server. He believes that a compromise of the file server could reveal information that would prevent the company from continuing to do business. What term best describes the risk that Tony is considering?

A

Strategic

48
Q

Greg recently conducted an assessment of his organization’s security controls and discovered a potential gap: the organization does not use full-disk encryption on laptops. What type of control gap exists in this case?

A

Preventive

49
Q

Which one of the following data protection techniques is reversible when conducted properly?

A

Tokenization