Chapter 1 & 2 Todays Security Professional & CyberSecurity Threat Landscape Flashcards
- What is the CIA triad of cybersecurity?
2a. What is C**?
2b. What is I?
2c. What is A**? - What data obfuscation method is used above?
- Confidentiality, Integrity, and Availability
2a. Ensures unauthorized users cannot access information
2b. Ensures there are no unauthorized modifications to data or systems
2c. Ensures that info and systems are ready to meet the needs of users when requested. - Masking
- What is the DAD Triad?
- Disclosure, Alteration, Denial
What differentiates Strategic vs. Operational Risk?
If a risk threatens the very existence of an organization and its ability to execute business plans, that is a strategic risk, which seriously jeopardizes the organizations ongoing viability. If a risk only causes inefficiency and delay within the organization, that is operational.
Strategic Risk - risk that an organization will become less effective in meeting its major goals and objectives as a result of a breach.
Operational Risk - risk to an organizations ability to carry out day to day functions.
Breach Impact: other risks
Financial Risk
Reputational Risk
Compliance Risk
Security Controls
Technical Controls - enforce CIA in digital space. ex. firewall rules, ACLs, IPSs, Encryption.
Operational Controls - processes put in place to manage technology, access reviews, log monitoring, vulnerability management.
Managerial Controls - procedural mechanisms that focus on mechanics of risk management, periodic risk assessments, security planning exercises, security practice incorporation.
Security Control Types
Preventative Controls - Firewalls and encryption
Detective Controls - Intrusion Detection (IDS)
Corrective Controls - Restoring backups after ransomware attack
Deterrent Controls - Guard dogs, barbed wire fences, etc.
Physical Controls - fences, lighting, locks, fire suppression/burglar alarms
Compensating Controls - designed to mitigate risk
PCI DSS Compensating Controls Criteria:
Control must meet intent and rigor of OEM requirement
Control must provide similar defense as OEM requirement
Control must be “above and beyond” other PCI DSS requirements