Chapter 1 Flashcards
What is cybersecurity?
The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
According to the U.S. Cybersecurity & Infrastructure Security Agency (CISA)
What does the CIA triad stand for?
Confidentiality, Integrity, Availability
What is the expected growth percentage of cybersecurity jobs between 2021 and 2023?
35%
What is the role of a Cybersecurity Architect (CSA)?
Helps shape, design, and plan the technical aspects of an organization’s approach to security at all levels
What are the three main topics covered in the introduction to cybersecurity?
- What is cybersecurity?
- Confidentiality/integrity/availability
- Networking and operating systems
True or False: The only secure computer system is one that is never turned on or used.
True
Define access control.
The procedure of permitting solely authorized individuals, programs, or other computer systems to observe, alter, or gain control over a computer system’s resources
What does secure software development encompass?
Procedures and tasks associated with the strategic planning, coding, and administration of software and systems to guarantee confidentiality, integrity, and availability
What is the goal of Business Continuity Planning/Disaster Recovery (BCP/DR)?
To uphold uninterrupted business operations in the face of significant disruptions
What is cryptography?
The science of using deception and mathematics to hide data from unwanted access
What is the purpose of information security governance and risk management?
To safeguard critical information assets and systems through holistic strategies
List the key responsibilities of security operations.
- Asset protection
- Monitoring and detection
- Incident response
- Ongoing maintenance
- Process integration
What does physical and environmental security involve?
Safeguarding facilities housing critical information systems against unauthorized access and environmental hazards
What is security architecture?
Translating organizational requirements into comprehensive cybersecurity designs encompassing people, processes, and technology controls
What is the main purpose of telecommunications/network security?
To ensure the confidentiality, integrity, and availability of data transmitted over networks
Fill in the blank: Cybersecurity is the mitigation of ______ to maintain confidentiality, integrity, and availability.
risk
What is the significance of governance frameworks in information security?
They provide guiding models for protection through integrated frameworks, policies, and standards
What are the components of legal/regulatory/compliance and investigations?
- Computer crime legislation
- Associated regulations
- Investigative measures
- Evidence gathering/management methodologies
- Reporting protocols
What does effective governance in cybersecurity require?
Going beyond technology to address human behavior, security awareness, and best practices
True or False: The growth of computers and web-based applications has only positive effects on society.
False
What is the typical breakdown of cybersecurity domains by ISC2?
- Access control
- Secure software development
- Business continuity planning/Disaster recovery (BCP/DR)
- Cryptography
- Information security governance/risk management
- Legal/regulatory/compliance and investigations
- Security operations
- Physical and environmental security
- Security architecture
- Telecommunications/network security
What is the CIA triad?
Confidentiality, Integrity, Availability
The CIA triad is a foundational concept in cybersecurity.
What does confidentiality refer to in cybersecurity?
Protecting information from unauthorized access
Confidentiality ensures that sensitive information is only accessible to authorized individuals.
What is integrity in the context of cybersecurity?
Reliability and completeness of data
Integrity ensures data has not been unintentionally modified or altered.
Define availability in cybersecurity.
Continuous accessibility and optimal functioning of data and systems
Availability ensures minimal disruptions or downtime for users.
Which aspect of cybersecurity ensures actions cannot be denied?
Non-repudiation
Non-repudiation provides evidence that a specific action took place.
What is data encryption?
Converting plaintext into coded form (ciphertext)
Encryption prevents unauthorized access to data content.
What are access controls?
Mechanisms to restrict access based on user roles
Access controls help prevent unauthorized individuals from accessing confidential data.
What is data validation?
Verifying the accuracy and consistency of data
Data validation ensures data meets predefined criteria.
What are hash functions?
Mathematical algorithms generating unique hash values for data
Hash functions help detect integrity violations by comparing hash values.
What does disaster recovery planning involve?
Creating strategies to recover systems and data after disruptions
This includes regular backups and documented restoration procedures.
What are Distributed Denial of Service (DDoS) attacks?
Attacks that overwhelm systems causing service unavailability
DDoS attacks can be mitigated through traffic filtering and CDNs.
What is the purpose of digital certificates?
Validate the identity of individuals or entities in transactions
Digital certificates are issued by trusted third parties.
What are audit trails?
Records capturing activities and events within a system
Audit trails provide evidence of actions performed in a system.
True or False: The CIA triad components are interconnected.
True
Understanding the relationships between confidentiality, integrity, and availability is vital.
What are Local Area Networks (LANs)?
Networks connecting devices within a limited geographical area
LANs are commonly used in homes and offices.
What is the function of routers in networking?
Direct data packets between different networks
Routers play a critical role in managing network traffic.
What is the principle of least privilege?
Users have only the necessary privileges to perform tasks
This principle reduces the risk of unauthorized access.
What is network segmentation?
Dividing a network into smaller, isolated segments
Network segmentation limits the impact of potential breaches.
What is the Untrusted Zone (UTZ)?
The lowest level of trust within a network, typically internet-facing
Traffic from the UTZ is usually restricted from entering other zones.
What does the Trusted Zone (TZ) represent?
The highest level of trust within a network
TZs are assumed to be secure and trustworthy.
Fill in the blank: The _______ Zone (RZ) contains the most sensitive data and databases.
Restricted
The RZ is characterized by stringent access controls.
What is perimeter defense in cybersecurity?
Security measures at the network’s edge against external threats
This includes firewalls and intrusion detection systems.
What are secure protocols?
Protocols ensuring encrypted communication to prevent eavesdropping
Examples include HTTPS.
What is the role of antivirus software in operating systems?
Detect and remove malicious programs
Antivirus solutions protect against various forms of malware.
What is the purpose of intrusion detection systems (IDSs) and intrusion prevention systems (IPSs)?
They monitor and filter network traffic
IDSs detect potential threats, while IPSs actively prevent them.
What does HTTPS stand for and what is its significance?
Hypertext Transfer Protocol Secure; it ensures encrypted communication between clients and servers
This prevents eavesdropping and data tampering.
What is the principle of least privilege?
Users have only the necessary privileges to perform their tasks
This reduces the risk of unauthorized access.
What does endpoint security focus on?
Securing individual devices connected to the network
It includes measures like antivirus software and host-based firewalls.
What are the fundamental components of cybersecurity?
Networking and operating systems
Understanding these enables comprehension of secure communication.
What are the types of applications?
Desktop applications, mobile applications, web applications, and enterprise applications
Each type has unique characteristics and security considerations.
What is application security?
It is vital in protecting sensitive information and ensuring reliable application functioning
It prevents unauthorized access and data breaches.
What is input validation?
Properly validating and sanitizing user inputs to prevent attacks
This includes protection against SQL injection and cross-site scripting (XSS).
What role does governance play in GRC?
It guides overall management and decision-making within an organization
Good governance ensures ethical and transparent operations.
What do regulations refer to in the context of GRC?
Rules and guidelines established by governmental bodies or industry regulators
Compliance with these is crucial for avoiding penalties.
What is compliance in GRC?
Adherence to laws, regulations, internal policies, and industry standards
It involves processes to ensure operations align with requirements.
What are common application security challenges?
Input validation, authentication and authorization, secure coding practices, secure configuration, and patch management
Addressing these challenges is essential for resilient applications.
What is the CIA triad?
Confidentiality, Integrity, and Availability
These are crucial aspects of protecting sensitive information.
What is the secure development life cycle (SDL)?
An approach to ensure application security throughout its development phases
It includes requirements, design, development, testing, deployment, and maintenance.
Fill in the blank: Governance, regulations, and _______ (GRC) is a framework for ethical conduct and risk mitigation.
Compliance
True or False: Organizations can ignore regulations if they have strong internal policies.
False
Organizations must comply with external regulations regardless of internal policies.
What is the significance of maintaining trust in application security?
Secure applications build trust among users, customers, and stakeholders
This leads to increased adoption and customer satisfaction.
What is the importance of application security in today’s digital landscape?
Protects sensitive data, prevents exploits, and maintains user trust
Essential for safeguarding against threats and vulnerabilities.
What are some key aspects related to applications?
Types of applications, application development, and common application platforms
Each aspect has unique security considerations.
What is the primary focus of the book ‘Mastering Windows Security and Hardening’?
Secure and protect your Windows environment from cyber threats using zero-trust security principles
What is the second edition of ‘Mastering Windows Security and Hardening’ about?
It covers securing and protecting Windows environments from cyber threats using zero-trust security principles
What does the book ‘Network Security Principles and Practices’ focus on?
Fundamental principles and practices of network security
What is included in the ‘Computer Security Handbook, Set (Volume 1 and 2) 6th Edition’?
Comprehensive coverage of computer security topics
What is the purpose of the ‘CISSP All-in-One Exam Guide, Ninth Edition’?
Preparation for the CISSP certification exam
Fill in the blank: ‘Mastering Windows Security and Hardening’ employs _______ security principles.
[zero-trust]
True or False: ‘Network Security Principles and Practices’ is a book focused solely on theoretical aspects of network security.
False
What are the two volumes of the ‘Computer Security Handbook’ designed to provide?
A comprehensive overview of computer security topics
What certification does the ‘CISSP All-in-One Exam Guide’ help prepare for?
CISSP certification
What is a key theme in the book ‘Mastering Windows Security and Hardening’?
Utilizing zero-trust security principles
List two books that focus on network security.
- Network Security Principles and Practices
- Mastering Windows Security and Hardening