Chapter 1 (Domain 1 & 3) Flashcards

Security Governance Through Principles and Policies

1
Q

Confidentiality

A

The goal of confidentiality protection is to prevent or minimize unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sensitivity

A

Sensitivity refers to the quality of information, which could cause harm or damage if disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Discretion

A

Discretion is an act of decision where an operator can influence or control disclosure in order to minimize harm or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Criticality

A

The level to which information is mission critical is its measure of criticality. The higher the level of criticality, the more likely the need to maintain the confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Concealment

A

Concealment is the act of hiding or preventing disclosure. Often concealment is viewed as a means of cover, obfuscation, or distraction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secrecy

A

Secrecy is the act of keeping something secret or preventing the disclosure of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Privacy

A

Privacy refers to keeping information confidential that is personally identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Seclusion

A

Seclusion involves storing something in an out-of-the-way location, likely with strict access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Isolation

A

Isolation is the act of keeping something separated from others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity

A

Integrity is the concept of protecting the reliability and correctness of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Availability

A

Availability means authorized subjects are granted timely and uninterrupted access to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DAD Triad

A

Disclosure, alteration, and destruction. Represents the failures of security protections in the CIA Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AAA services

A

Identification, Authentication, Authorization, Auditing, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Defense In Depth terms

A

Level, multi-leveled, layers.

Classifications, zones, realms, components, compartments, silos, segmentation, lattice structure, and protection rings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Abstraction

A

Abstraction is used for efficiency. Similar elements are put into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Hiding

A

Preventing data from being discovers or accessed by a subject by positioning the data in a logical storage compartment that is not accessible or seen by the subject.

17
Q

Three types of security management planning

A

1) Strategic
2) Tactical
3) Operational

18
Q

Organization Roles

A

Senior Manager-Ultimately responsible for the security maintained by an organization.
Security Professional-Writing and implementing policies
Asset Owner-Responsible for classifying information for placement and protection
Custodian-Implements the controls
User-Responsible for understanding and upholding the security policy
Auditor-Reviewing and verifying that the security policy is properly implemented.

19
Q

Merger/Acquisition Risks

A
  • Inappropriate information disclosure
  • Data loss
  • Down time
  • Failure to achieve sufficient ROI
20
Q

What is COBIT?

A

Control Objectives for Information and Related Technology - Security concept infrastructure used to organize the complex solutions of companies.

21
Q

COBIT Six key principles

A

1) Provide stakeholder value
2) Holistic approach
3) Dynamic governance system
4) Governance distinct from management
5) Tailored to enterprise needs
6) End-to-end governance

22
Q

NIST 800-53 Rev 5

A

Contains U.S. government-sourced general recommendations for organizational security.

23
Q

CIS

A

Center for Interned Security - Provides OS, application, and hardware security configuration guides

24
Q

NIST Risk Management Framework(RMF)

Six phases

A

Establishes mandatory requirements for federal agencies.

1) Categorize
2) Select
3) Implement
4) Assess
5) Authorize
6) Monitor

25
Q

NIST Cybersecurity Framework (CSF)

Five functions

A

Designed for critical infrastructure and commercial organizations.

1) Identify
2) Protect
3) Detect
4) Respond
5) Recover

26
Q

ISO / IEC

A

International Organization for Standardization / International Electrotechnical Commission 2700 family group - International standard that can be the basis of implementing organizational security and related management practices.

27
Q

ITIL

A

Information Technology Infrastructure Library - Developed by British and became an international standard. Best practices for optimization of IT services to support business growth, transformation, and change. Customized IT security solution.

28
Q

Threat Modeling Basics

A

Identify;Categorize;Analyze
Focus on Assets, Focus on Attackers, Focus on Software
Threat Models:
STRIDE, PASTA, VAST, DREAD

29
Q

STRIDE

A
Microsoft developed threat categorization scheme.
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of privilege
30
Q

PASTA

A

Risk-centric approach that aims at selecting or developing countermeasures in relation to the value of the asset being protected.
Stages I: Definition of the Objectives(DO) for the Analysis of Risks
Stage II: Definition of the Technical Scope (DTS)
Stage III: Application Decomposition and Analysis (ADA)
Stage IV: Threat Analysis(TA)
Stage V: Weakness and Vulnerability Analysis(WVA)
Stage VI: Attack Modeling & Simulation(AMS)
Stage VII: Risk Analysis & Management(RAM)

31
Q

VAST

A

Visual, Agile, and Simple Threat - Threat modeling concept that integrates threat and risk management into an Agile programming environment on a scalable basis.

32
Q

Decomposition process five key concepts

A

1) Trust boundaries
2) Dataflow paths
3) Input points
4) Privileged Operation
5) Details about security stance and approach

33
Q

DREAD

A
Rating system designed to provide a flexible rating solution that is based on the answer to five main questions about each threat.
Damage Potential
Reproducibility
Exploitability
Affected Users
Discoverability
34
Q

SCRM

A

Supply Chain Risk Management