Chapter 1 Flashcards

In the first section of this chapter, you will learn about the basic objectives of cybersecurity: confidentiality, integrity, and availability of your operations. In the sections that follow, you will learn about some of the controls that you can put in place to protect your most sensitive data from prying eyes. This chapter sets the stage for the remainder of the book, where you will dive more deeply into many different areas of cybersecurity

1
Q

The three key objectives of cybersecurity programs are?

A

confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality ensures that?

A

unauthorized individuals are not able to gain access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity ensures that?

A

there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability ensures that?

A

information and systems are ready to meet the needs of legitimate users at the time those users request them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is Nonrepudiation?

A

Nonrepudiation means that
someone who performed some action, such as sending a message, cannot later deny having taken that action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a common example of nonrepudiation?

A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The three key threats to cybersecurity programs are?

A

disclosure, alteration, and denial. (DAD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disclosure is also known as?

A

Data Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disclosure is a violation of which principle?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the full meaning of PII?

A

Personal Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the full meaning of AUP?

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HIPAA stands for?

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

——– controls enforce confidentiality, integrity, and
availability in the digital space

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

examples of technical controls are:

A

firewall rules, access control lists, intrusion prevention systems, and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operational controls are?

A

the processes that we put in place to manage technology in a secure manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

user access
reviews, log monitoring, and vulnerability management are examples of?

A

Operational Controls

17
Q

Managerial controls are?

A

procedural mechanisms that focus on the mechanics of the risk management process.

18
Q

examples of Managerial controls are?

A

periodic risk assessments, security planning exercises, and the incorporation of security into the organization’s change management, service acquisition, and project management practices.

19
Q

Physical controls are security controls that impact the physical world. T/F?

A

True

20
Q

what is the full meaning of PCI DSS?

A

The Payment Card Industry Data Security Standard

21
Q

Data at rest is?

A

is stored data that resides on hard drives, tapes, in the cloud, or on other storage media

22
Q

data that is in motion/transit over a network is?

A

Data in Transit

23
Q

The data stored in memory while processing takes
place is called?

A

Data in Use

24
Q

—– uses software agents installed on systems that
search those systems for the presence of sensitive information.

A

Agent-Based DLP

25
Q

Agentless (network-based) DLP systems are?

A

dedicated devices that sit
on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information.

26
Q
A