Chapter 1 Flashcards

1
Q

What is the CIA Triad?

A

Three principles of security control and management. Also known as the information security triad. Also
referred to in reverse order as the AIC triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confifidentiality

A

The fundamental security goal of keeping information and communications private and protecting them from
unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

The fundamental security goal of keeping organizational information accurate, free of errors, and without
unauthorized modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The fundamental security goal of ensuring that computer systems operate continuously and that authorized
persons can access data that they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-repudiation

A

The security goal of ensuring that the party that sent a transmission or created data remains associated with that
data and cannot deny sending or creating that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

National Institute of Standards and Technology
(NIST)

A

Develops computer security standards used by US federal agencies and publishes cybersecurity best practice
guides and research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cybersecurity frameworks (CSF).

A

Standards, best practices, and guidelines for effective security risk management. Some frameworks are general
in nature, while others are specific to industry or technology types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

security controls

A

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality,
integrity, and availability (CIA) of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Gap analysis

A

An analysis that measures the difference between the current and desired states in order to help assess the
scope of work included in a project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

identity and access management (IAM)

A

A security process that provides identification, authentication, and authorization mechanisms for users,
computers, and other entities to work with organizational assets like networks, operating systems, and
applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identification

A

The process by which a user account (and its credentials) is issued to the correct person. Sometimes referred to
as enrollment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

A method of validating a particular entity’s or individual’s unique credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorization

A

The process of determining what rights and privileges a particular entity has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accounting

A

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is
detected or attempted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

authentication, authorization, and accounting (AAA)

A

A security concept where a centralized platform verifies subject identification, ensures the subject is assigned
relevant permissions, and then logs these actions to create an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security control

A

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality,
integrity, and availability (CIA) of information.

17
Q

Managerial

A

The control gives oversight of the information system. Examples could include risk identification or a tool
allowing the evaluation and selection of other security controls.

18
Q

Operational

A

A category of security control that is implemented by people.

19
Q

Technical

A

The control is implemented as a system (hardware, software, or firmware). For example, firewalls, antivirus
software, and OS access control models are technical controls.

20
Q

Physical

A

Controls such as alarms, gateways, locks, lighting, and security cameras that deter and detect access to
premises and hardware are often placed in a separate category to technical controls.

21
Q

Preventive

A

A type of security control that acts before an incident to eliminate or reduce the likelihood that an attack can
succeed.

22
Q

Access control lists (ACL)

A

The collection of access control entries (ACEs) that determines which subjects (user accounts, host IP
addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write,
and so on).

23
Q

Detective

A

A type of security control that acts during an incident to identify or record that it is happening.

24
Q

Corrective

A

A type of security control that acts after an incident to eliminate or minimize its impact.

25
Q

Directive

A

A type of control that enforces a rule of behavior through a policy or contract.

26
Q

Deterrent

A

A type of security control that discourages intrusion attempts.

27
Q

Compensating

A

A security measure that takes on risk mitigation when a primary control fails or cannot completely meet
expectations.

28
Q

Chief Information Officer (CIO)

A

A company officer with the primary responsibility for management of information technology assets and
procedures.

29
Q

Chief Technology Officer (CTO)

A

A company officer with the primary role of making effective use of new and emerging computing platforms
and innovations.

30
Q

Chief Security Officer (CSO)

A

Typically the job title of the person with overall responsibility for information assurance and systems security.

31
Q

security operations center (SOC)

A

The location where security professionals monitor and protect critical information assets in an organization.

32
Q

Information Systems Security Officer (ISSO)

A

Organizational role with technical responsibilities for implementation of security policies, frameworks, and
controls.

33
Q

security operations center (SOC)

A

The location where security professionals monitor and protect critical information assets in an organization.

34
Q

Development and operations (DevOps)

A

A combination of software development and systems operations, and refers to the practice of integrating one
discipline with the other.

35
Q

DevSecOps

A

A combination of software development, security operations, and systems operations, and refers to the practice
of integrating each discipline with the others.

36
Q

computer incident response team (CIRT)

A

Team with responsibility for incident response. The CSIRT must have expertise across a number of business
domains (IT, HR, legal, and marketing, for instance).