Chapter 1 - General Concepts Flashcards

1
Q

What are the three components of the CIA triad?

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Confidentiality protect against?

A

The unauthorized disclosure of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of Confidentiality controls?

A

Firewalls, access control lists, encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an example of Integrity control?

A

Hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples of Availability controls?

A

Fault tolerance, clustering, backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Nonrepudiation?

A

Nonrepudiation means that someone who performed some action cannot later deny having taken that action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a common example of Nonrepudiation control?

A

Digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three key threats to cybersecurity?

A

Disclosure, Alteration and Denial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five main types of risks that organizations may face as result of a breach?

A
  1. Financial risk
  2. Reputational risk
  3. Strategic risk
  4. Operational risk
  5. Compliance risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Control Objectives?

A

Control objectives are statements of a desired security state for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Security Controls?

A

Security controls are specific measures that fulfill the security objectives of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Gap Analysis?

A

A cybersecurity review where a security professional checks the control objectives for an organization and then examines the controls designed to achieve those objectives to make sure they are working as intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the four Security Control Categories.

A
  1. Technical controls
  2. Operational controls
  3. Managerial controls
  4. Physical controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the six Security Control Types.

A
  1. Preventive controls
  2. Deterrent controls
  3. Detective controls
  4. Corrective controls
  5. Compensating controls
  6. Directive controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the three states in which data might exist.

A
  1. Data at rest
  2. Data in transit
  3. Data in use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of Data Minimization?

A

Data minimization seeks to reduce risk by reducing the amount of sensitive data that is maintained on a regular basis.