Chapter 1 Flashcards

1
Q

CIA Triad

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Unauthorized individuals are not able to gain access to sensitive information

prevent using: fireballs, access control lists, and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

No unauthorized modifications are made to information or systems

Prevent using: basing and integrity monitoring solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Information and systems are ready to meet the needs to legitimate users when they are requested

Prevent using: fault tolerance, clustering, and backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security incidents

A

Organizations experience a breach of the CIA triad of information or information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DAD Triad

A

Three key threats to cybersecurity efforts: disclosure, alteration, denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disclosure

A

Exposure if sensitive information to unauthorized individuals, violating confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Alteration

A

Unauthorized modification of information violating integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial

A

Unintended disruption of an authorized users legitimate access to information violating availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data exfiltration

A

Attacker gains access to sensitive information and removes It from the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Breach impact

A

Measured risk by: financial, reputations, strategic, operational, and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Financial risk

A

Risk of monetary damage to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reputational risk

A

Negative publicity surrounding a breach causes loss of customers, employees, suppliers, and stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Strategic risk

A

Risk that an organization will become less effective in meeting major goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operational risk

A

Risk to the organizations ability to carry out day to day functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compliance risk

A

Security breach causes an organization to run afoul of legal or regulatory requirements

17
Q

Security controls

A

Specific measures that fulfill the security objectives of an organization

Categories: technical, operational, managerial

18
Q

Technical controls

A

Enforce CIA in the digital space

Examples: firewall rules, access control lists, intrusion prevention systems, encryption

19
Q

Operational controls

A

The process to manage technology in a secure manner

Examples: user access reviews, log monitoring, and vulnerability management

20
Q

Managerial controls

A

Procedures focused in the mechanics of the risk management process

Examples: risk assessment, security planning exercises, incorporation if security into change management/service acquisition/project management practices

21
Q

Preventative controls

A

Stop a security issue before It occurs

Examples: firewalls, encryption

22
Q

Detective controls

A

Identify security events that have already occurred

Example: intrusion detection systems

23
Q

Corrective controls

A

Remediate security issues that have occurred

Example: restoring backups after an attack

24
Q

Deterrent controls

A

Seek to prevent an attacker from attentions to violate security policies

Example: guard dogs, wired fence

25
Q

Physical controls

A

Security controls that impact the physical world

Example: fences, perimeter lighting, locks, fire suppression, burglar alarm

26
Q

Compensating controls

A

Designed to mitigate the risk associated with exceptions made to a security policy

27
Q

Data loss prevention (DLP) systems

A

Search systems for stores of sensitive information that might be unsecured and monitor network traffic for potential attempts to remove sensitive information from the organization

Environments: host-based DLP and network DLP

28
Q

Host-based DLP

A

Uses software agents installed on a system to search for the presence of sensitive information and monitors system configurations and users actions, blocking undesirable actions

29
Q

Network-based DLP

A

Devices dedicated to sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information

30
Q

DLP mechanisms of action

A

Pattern matching and watermarking

31
Q

Pattern matching

A

Watch for signs of sensitive information

Example: numbers formatted like a credit card or ssn

32
Q

Watermarking

A

Systems or administrators apply electronic tags to sensitive documents and the DLP system monitors systems and networks for unencrypted content containing those tags

33
Q

Data minimization

A

Reduce risk by reducing the amount of sensitive information that we maintain on a regular basis

34
Q

De-identification

A

Removed the ability to link data back to an individual

35
Q

Data obfuscation

A

Data is transformed into a format where the original information cannot be retrieved

Tools: hashing, tokenization, masking

36
Q

Hashing

A

Transform a value in a dataset to a corresponding hash value

37
Q

Tokenization

A

Replaced sensitive values with a unique identifier using a look up table

38
Q

Masking

A

Partially redacts sensitive information by replacing some or all sensitive fields with blank characters

Example: credit cards numbers replaced with * except for the last 4 numbers