chapter 1+2 Information security and cloud secuity Flashcards

1
Q

What is information system security?

A

Information system security (infosec) refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key objectives of security?

A

The key objectives of security are Prevention, Detection, Response, and Recovery (PDRR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is security important?

A

Security is important for protecting against threats, safeguarding assets, maintaining trust, ensuring compliance, and preventing financial loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are tangible assets?

A

Tangible assets are physical, material objects that can be touched or measured, such as hardware and facilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are intangible assets?

A

Intangible assets are non-physical resources that provide value but cannot be touched, such as data and brand reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of assets should be secured?

A

Types of assets that should be secured include Information Assets, Physical Assets, Digital Assets, Network Assets, and Human Assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the relationship between different types of security?

A

Different types of security, such as information security, cybersecurity, internet security, network security, and web security, are interrelated and collectively form a layered approach to protecting assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the OSI Security Architecture?

A

The OSI Security Architecture considers three aspects: security attacks, security mechanisms, and security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does confidentiality ensure?

A

Confidentiality ensures that computer-related assets are accessed only by authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the goal of hardening systems?

A

The goal of hardening systems is to make it harder to exploit vulnerabilities, deterring attackers by increasing effort and reducing reward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the significance of layered security?

A

A layered security approach combines multiple layers of protection to create a stronger defense, reducing overall risk if one layer fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are primary information assets?

A

Primary information assets are data, information, or knowledge that has value, is organized, and enables the organization to operate business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are supporting, secondary information assets?

A

Supporting, secondary information assets include software, hardware, people, physical infrastructure, processes, and purchased services essential for making data available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an organization in the context of security?

A

An organization intended to counter security attacks and make use of one or more security mechanisms to provide the service.

Examples include having signatures, dates, and needing protection from disclosure, tampering, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the ‘C’ in CIA stand for?

A

Confidentiality: ensures that computer-related assets are accessed only by authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is data confidentiality?

A

Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is privacy in the context of confidentiality?

A

Assures that individuals control or influence what information related to them may be collected and stored and by whom.

18
Q

What does the ‘I’ in CIA stand for?

A

Integrity: means that assets can be modified only by authorized parties or only in authorized ways.

19
Q

What is data integrity?

A

Assures that information and programs are changed only in a specified and authorized manner.

20
Q

What does the ‘A’ in CIA stand for?

A

Availability: means that assets are accessible to authorized parties at appropriate times.

21
Q

What is the impact of a loss of availability?

A

Disruption of access to or use of information or an information system.

22
Q

What is authenticity in information security?

A

The property of being genuine and being able to be verified and trusted.

23
Q

What is accountability in information security?

A

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

24
Q

What is authentication?

A

Any process by which you verify that someone is who they claim they are.

25
Q

What is non-repudiation?

A

Means that the sender or generator of information cannot deny that they did send or generate the information.

26
Q

What is access control?

A

Only authorized parties can use specific resources.

27
Q

What are the three levels of impact on organizations from a breach of security?

A

Low, Moderate, High.

28
Q

What is the Hacker’s Triad?

A

DAD: Disclosure, Alteration, Destruction.

29
Q

What is a vulnerability?

A

A weakness in the security system implementation or operation that can make assets corrupted, leaky, or unavailable.

30
Q

What is a threat?

A

Capable of exploiting vulnerabilities and represents potential security harm to an asset.

31
Q

What is an attack?

A

An action or series of actions to harm a system, leading to a violation of security policy.

32
Q

What is a countermeasure?

A

Any means taken to deal with a security attack, ideally to prevent, detect, or recover from the attack.

33
Q

What are the two types of attacks based on impact?

A

Passive attacks and Active attacks.

34
Q

What is a passive attack?

A

Attempts to learn or make use of information from the system but does not affect system resources.

35
Q

What is an active attack?

A

Attempts to alter system resources or affect their operation.

36
Q

What is interception in the context of attacks?

A

Eavesdropping where an unauthorized party gains access to an asset, attacking confidentiality.

37
Q

What is interruption in the context of attacks?

A

The action of preventing a message from reaching its intended recipient, attacking availability.

38
Q

What is modification in the context of attacks?

A

An unauthorized party alters the content of a message, attacking integrity.

39
Q

What is fabrication in the context of attacks?

A

An unauthorized party inserts counterfeit objects into the system, attacking authenticity.

40
Q

What are the fundamental principles of information security design?

A

Isolation, Encapsulation, Least privilege, Economy of mechanism.