Chapter 1 Flashcards

Security Governance Through Principles and Policies

1
Q

Define Information Technology or Information Systems

A

The hardware and software that support the operations or functions of a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three common types of security evaluation?

A

Risk Assessment, Vulnerability Assessment, and Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Risk Assessment

A

identifying assets, threats, and vulnerabilities to calculate risk. Once risk is understood, it is used to guide the improvement of the existing security infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Vulnerability assessment

A

automated tools to locate known security weaknesses, which can be addressed by adding more defenses or adjusting the current protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Penetration testing

A

uses trusted teams to stress-test the security infrastructure to find issues that may not be discovered by the prior two means and to find those concerns before an adversary takes advantage of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 Pillars of Information Security

A

confidentiality, integrity, availability, authenticity, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What 3 Pillars of Information Security are CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Confidentiality?

A

the concept of the measures used to ensure the protection of the secrecy of data, objects, or resources. The goal of confidentiality protection is to prevent or minimize unauthorized access to data. Confidentiality protections prevent disclosure while protecting authorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 8 concepts of Confidentiallity?

A

Sensitivity, Discretion, Criticality, Concealment, Secrecy, Privacy, Seclusion, Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Sensitivity?

A

refers to the quality of information that could cause harm or damage if disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Discretion?

A

a decision where an operator can influence or control disclosure to minimize harm or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Criticality?

A

The level to which information is mission critical is its measure of criticality. The higher the level of criticality, the more likely the need to maintain the confidentiality of the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Concealment

A

The act of hiding or preventing disclosure. Concealment is often viewed as a means of cover, obfuscation, or distraction. A related concept to concealment is security through obscurity, which attempts to gain protection through hiding, silence, or secrecy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Secrecy?

A

the act of keeping something a secret or preventing the disclosure of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Privacy?

A

keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Seclusion?

A

storing something in an out-of-the-way location, likely with strict access controls.

17
Q

What is Isolation?

A

the act of keeping something separated from others.

18
Q

What is integrity

A

the concept of protecting the reliability and correctness of data.

19
Q

What are the three perspectives of integrity?

A

Preventing unauthorized subjects from making modifications
Preventing authorized subjects from making unauthorized modifications, such as mistakes
Maintaining the internal and external consistency of objects so that their data is a correct and true reflection of the real world and any relationship with any other object is valid, consistent, and verifiable

20
Q

What is accuracy?

A

Being correct and precise

21
Q

What is truthfulness?

A

Being a true reflection of reality

22
Q

What is validity?

A

Being factually or logically sound

23
Q

What is accountability?

A

Being responsible or obligated for actions and results

23
Q

What is responsibility?

A

Being in charge or having control over something or someone

24
Q

What is completeness?

A

Having all necessary components or parts

25
Q

What is comprehensiveness?

A

Being complete in scope; the full inclusion of all needed elements

26
Q

What is availability?

A

authorized subjects are granted timely and uninterrupted access to objects.

27
Q

What is usability?

A

The state of being easy to use or learn or being able to be understood and controlled by a subject

28
Q

What is Accessability?

A

The assurance that the widest range of subjects can interact with a resource regardless of their capabilities or limitations

29
Q

What is timeliness?

A

Being prompt, on time, within a reasonable time frame, or providing a low-latency response

30
Q

What is the DAD triad?

A

Disclosure, alteration, and destruction

31
Q

What is disclosure?

A

when sensitive or confidential material is accessed by unauthorized entities. It is a violation of confidentiality.

32
Q

What is alteration?

A

when data is either maliciously or accidentally changed. It is a violation of integrity.

33
Q

What is desctruction?

A

when a resource is damaged or made inaccessible to authorized users (technically, we usually call the latter denial of service [DoS]). Destruction is a violation of availability.

34
Q
A