Chapter 1 Flashcards

1
Q

What is cybersecurity?

A

The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information

According to the U.S. Cybersecurity & Infrastructure Security Agency (CISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA triad stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the expected growth percentage of cybersecurity jobs between 2021 and 2023?

A

35%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of a Cybersecurity Architect (CSA)?

A

Helps shape, design, and plan the technical aspects of an organization’s approach to security at all levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three main topics covered in the introduction to cybersecurity?

A
  • What is cybersecurity?
  • Confidentiality/integrity/availability
  • Networking and operating systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: The only secure computer system is one that is never turned on or used.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define access control.

A

The procedure of permitting solely authorized individuals, programs, or other computer systems to observe, alter, or gain control over a computer system’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does secure software development encompass?

A

Procedures and tasks associated with the strategic planning, coding, and administration of software and systems to guarantee confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the goal of Business Continuity Planning/Disaster Recovery (BCP/DR)?

A

To uphold uninterrupted business operations in the face of significant disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cryptography?

A

The science of using deception and mathematics to hide data from unwanted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of information security governance and risk management?

A

To safeguard critical information assets and systems through holistic strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the key responsibilities of security operations.

A
  • Asset protection
  • Monitoring and detection
  • Incident response
  • Ongoing maintenance
  • Process integration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does physical and environmental security involve?

A

Safeguarding facilities housing critical information systems against unauthorized access and environmental hazards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is security architecture?

A

Translating organizational requirements into comprehensive cybersecurity designs encompassing people, processes, and technology controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main purpose of telecommunications/network security?

A

To ensure the confidentiality, integrity, and availability of data transmitted over networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: Cybersecurity is the mitigation of ______ to maintain confidentiality, integrity, and availability.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the significance of governance frameworks in information security?

A

They provide guiding models for protection through integrated frameworks, policies, and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the components of legal/regulatory/compliance and investigations?

A
  • Computer crime legislation
  • Associated regulations
  • Investigative measures
  • Evidence gathering/management methodologies
  • Reporting protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does effective governance in cybersecurity require?

A

Going beyond technology to address human behavior, security awareness, and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False: The growth of computers and web-based applications has only positive effects on society.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the typical breakdown of cybersecurity domains by ISC2?

A
  • Access control
  • Secure software development
  • Business continuity planning/Disaster recovery (BCP/DR)
  • Cryptography
  • Information security governance/risk management
  • Legal/regulatory/compliance and investigations
  • Security operations
  • Physical and environmental security
  • Security architecture
  • Telecommunications/network security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the CIA triad?

A

Confidentiality, Integrity, Availability

The CIA triad is a foundational concept in cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does confidentiality refer to in cybersecurity?

A

Protecting information from unauthorized access

Confidentiality ensures that sensitive information is only accessible to authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is integrity in the context of cybersecurity?

A

Reliability and completeness of data

Integrity ensures data has not been unintentionally modified or altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define availability in cybersecurity.

A

Continuous accessibility and optimal functioning of data and systems

Availability ensures minimal disruptions or downtime for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which aspect of cybersecurity ensures actions cannot be denied?

A

Non-repudiation

Non-repudiation provides evidence that a specific action took place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is data encryption?

A

Converting plaintext into coded form (ciphertext)

Encryption prevents unauthorized access to data content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are access controls?

A

Mechanisms to restrict access based on user roles

Access controls help prevent unauthorized individuals from accessing confidential data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is data validation?

A

Verifying the accuracy and consistency of data

Data validation ensures data meets predefined criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are hash functions?

A

Mathematical algorithms generating unique hash values for data

Hash functions help detect integrity violations by comparing hash values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does disaster recovery planning involve?

A

Creating strategies to recover systems and data after disruptions

This includes regular backups and documented restoration procedures.

32
Q

What are Distributed Denial of Service (DDoS) attacks?

A

Attacks that overwhelm systems causing service unavailability

DDoS attacks can be mitigated through traffic filtering and CDNs.

33
Q

What is the purpose of digital certificates?

A

Validate the identity of individuals or entities in transactions

Digital certificates are issued by trusted third parties.

34
Q

What are audit trails?

A

Records capturing activities and events within a system

Audit trails provide evidence of actions performed in a system.

35
Q

True or False: The CIA triad components are interconnected.

A

True

Understanding the relationships between confidentiality, integrity, and availability is vital.

36
Q

What are Local Area Networks (LANs)?

A

Networks connecting devices within a limited geographical area

LANs are commonly used in homes and offices.

37
Q

What is the function of routers in networking?

A

Direct data packets between different networks

Routers play a critical role in managing network traffic.

38
Q

What is the principle of least privilege?

A

Users have only the necessary privileges to perform tasks

This principle reduces the risk of unauthorized access.

39
Q

What is network segmentation?

A

Dividing a network into smaller, isolated segments

Network segmentation limits the impact of potential breaches.

40
Q

What is the Untrusted Zone (UTZ)?

A

The lowest level of trust within a network, typically internet-facing

Traffic from the UTZ is usually restricted from entering other zones.

41
Q

What does the Trusted Zone (TZ) represent?

A

The highest level of trust within a network

TZs are assumed to be secure and trustworthy.

42
Q

Fill in the blank: The _______ Zone (RZ) contains the most sensitive data and databases.

A

Restricted

The RZ is characterized by stringent access controls.

43
Q

What is perimeter defense in cybersecurity?

A

Security measures at the network’s edge against external threats

This includes firewalls and intrusion detection systems.

44
Q

What are secure protocols?

A

Protocols ensuring encrypted communication to prevent eavesdropping

Examples include HTTPS.

45
Q

What is the role of antivirus software in operating systems?

A

Detect and remove malicious programs

Antivirus solutions protect against various forms of malware.

46
Q

What is the purpose of intrusion detection systems (IDSs) and intrusion prevention systems (IPSs)?

A

They monitor and filter network traffic

IDSs detect potential threats, while IPSs actively prevent them.

47
Q

What does HTTPS stand for and what is its significance?

A

Hypertext Transfer Protocol Secure; it ensures encrypted communication between clients and servers

This prevents eavesdropping and data tampering.

48
Q

What is the principle of least privilege?

A

Users have only the necessary privileges to perform their tasks

This reduces the risk of unauthorized access.

49
Q

What does endpoint security focus on?

A

Securing individual devices connected to the network

It includes measures like antivirus software and host-based firewalls.

50
Q

What are the fundamental components of cybersecurity?

A

Networking and operating systems

Understanding these enables comprehension of secure communication.

51
Q

What are the types of applications?

A

Desktop applications, mobile applications, web applications, and enterprise applications

Each type has unique characteristics and security considerations.

52
Q

What is application security?

A

It is vital in protecting sensitive information and ensuring reliable application functioning

It prevents unauthorized access and data breaches.

53
Q

What is input validation?

A

Properly validating and sanitizing user inputs to prevent attacks

This includes protection against SQL injection and cross-site scripting (XSS).

54
Q

What role does governance play in GRC?

A

It guides overall management and decision-making within an organization

Good governance ensures ethical and transparent operations.

55
Q

What do regulations refer to in the context of GRC?

A

Rules and guidelines established by governmental bodies or industry regulators

Compliance with these is crucial for avoiding penalties.

56
Q

What is compliance in GRC?

A

Adherence to laws, regulations, internal policies, and industry standards

It involves processes to ensure operations align with requirements.

57
Q

What are common application security challenges?

A

Input validation, authentication and authorization, secure coding practices, secure configuration, and patch management

Addressing these challenges is essential for resilient applications.

58
Q

What is the CIA triad?

A

Confidentiality, Integrity, and Availability

These are crucial aspects of protecting sensitive information.

59
Q

What is the secure development life cycle (SDL)?

A

An approach to ensure application security throughout its development phases

It includes requirements, design, development, testing, deployment, and maintenance.

60
Q

Fill in the blank: Governance, regulations, and _______ (GRC) is a framework for ethical conduct and risk mitigation.

A

Compliance

61
Q

True or False: Organizations can ignore regulations if they have strong internal policies.

A

False

Organizations must comply with external regulations regardless of internal policies.

62
Q

What is the significance of maintaining trust in application security?

A

Secure applications build trust among users, customers, and stakeholders

This leads to increased adoption and customer satisfaction.

63
Q

What is the importance of application security in today’s digital landscape?

A

Protects sensitive data, prevents exploits, and maintains user trust

Essential for safeguarding against threats and vulnerabilities.

64
Q

What are some key aspects related to applications?

A

Types of applications, application development, and common application platforms

Each aspect has unique security considerations.

65
Q

What is the primary focus of the book ‘Mastering Windows Security and Hardening’?

A

Secure and protect your Windows environment from cyber threats using zero-trust security principles

66
Q

What is the second edition of ‘Mastering Windows Security and Hardening’ about?

A

It covers securing and protecting Windows environments from cyber threats using zero-trust security principles

67
Q

What does the book ‘Network Security Principles and Practices’ focus on?

A

Fundamental principles and practices of network security

68
Q

What is included in the ‘Computer Security Handbook, Set (Volume 1 and 2) 6th Edition’?

A

Comprehensive coverage of computer security topics

69
Q

What is the purpose of the ‘CISSP All-in-One Exam Guide, Ninth Edition’?

A

Preparation for the CISSP certification exam

70
Q

Fill in the blank: ‘Mastering Windows Security and Hardening’ employs _______ security principles.

A

[zero-trust]

71
Q

True or False: ‘Network Security Principles and Practices’ is a book focused solely on theoretical aspects of network security.

72
Q

What are the two volumes of the ‘Computer Security Handbook’ designed to provide?

A

A comprehensive overview of computer security topics

73
Q

What certification does the ‘CISSP All-in-One Exam Guide’ help prepare for?

A

CISSP certification

74
Q

What is a key theme in the book ‘Mastering Windows Security and Hardening’?

A

Utilizing zero-trust security principles

75
Q

List two books that focus on network security.

A
  • Network Security Principles and Practices
  • Mastering Windows Security and Hardening