Chapter 1 - Basic Security Flashcards

1
Q

What are the three fundamental questions about security?

A
  1. What assets need protection?
  2. How are the assets threatened?
  3. What counteractions can be used to mitigate the threat?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the NIST definition of Security?

A

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources ( includes hardware, software, firmware, information/data and telecommunications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the CIA triad?

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the subtopics of confidentiality?

A

Data and privacy confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the subtopics of integrity?

A

Data integrity and system integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What was added to the CIA triad?

A

Authenticity and accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is low level impact?

A

Minot damages, financial loss and injury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is moderate level impact?

A

Significant damages, financial loss and injury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is high level impact?

A

Catastrophic damages, financial loss and injury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are assets?

A

Anything that needs to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is vulnerability?

A

A flaw of weakness in a systems design, implementation or operations and management that could be exploited to violate the systems security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are threats?

A

Exploitation; a potential for violations of security, which exists when there is a circumstance, capability, actions or event that could breach security and cause harm. That is a threat is a possible danger that might exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an attack?

A

A threat that has been acted upon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 17 functional areas of computer security?

A
Access control
Identification
Authentication
System and communication protection 
System and information integrity protections 
Awareness and training
Auditing and accountability 
Certification provide identification authenticity
Accreditation 
Security assessments
Contingency planning
Maintenance(updates)
Physical/ environmental protection 
Planning 
Personal security 
Risk assessment 
System acquisition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly