Chapter 1: Mastering Security Basics Flashcards

Introduction to core security goals.

1
Q

What are the three core goals of Cybersecurity?

A

Maintaining confidentiality, integrity, and availability. AKA CIA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality?

A

The ability to prevent the unauthorized disclosure of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is encryption?

A

Any number of methods that scramble data to make it unreadable to unauthorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three core identity and access control management activities of access controls?

A

Identification, Authentication, and Authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Identification?

A

When a user claims an identity (e.g. userID, username, email).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Authentication?

A

When a user proves their identity (through something they know, something they have, something they know, or somewhere they are).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Authorization?

A

Determines what resources to grant or restrict access to based on some rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Integrity?

A

The various methods that prevent the unauthorized alteration of information or systems. It keeps info safe from intentional or accidental changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Hashing?

A

An integrity method that converts data into a fixed-size hash value to ensure data integrity, prevent tampering, and verify authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Availability?

A

The various methods that ensures authorized users are able to access information and systems when they need them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Redundancy?

A

Adds duplicates of critical systems to provide FAULT TOLERANCE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Fault Tolerance?

A

The ability for a system to continue functioning despite the failure of one or more components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Disk Redundancies?

A

A method of storing the same data in multiple locations to ensure data availability and fault tolerance in case of hardware failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Server Redundancies?

A

Additional standby/backup servers can continue to make services available when the operating server fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Network Redundancies?

A

Adding additional bandwidth support in case any network path fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Power Redundancies?

A

Adding backup power sources in case commercial power fails (e.g. uninterruptible power supplies aka UPSs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Scalability?

A

The ability to increase the capacity of your system/service in the face of increasing demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Horizontal Scalability?

A

Increasing the capacity of system/services by adding more servers to existing infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Vertical Scalability?

A

Increasing the capacity of system/services by adding more resources to pre-existing servers (e.g. such as RAM, CPU power, storage, etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Elasticity?

A

The automation of scalability by having systems add/remove resources as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Patching?

A

A process that ensures that systems stay available by keeping them up-to-date with patches that resolve bugs that can compromise CIA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Resiliency?

A

The ability for a system to heal itself/recover from faults with minimal downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the difference between high availability and resiliency?

A

High availability is proactive by keeping services alive continuously whilst resiliency is reactive by accepting failure might happen but prepares itself to recover quickly from them.

24
Q

What is Risk?

A

The possibility of a threat exploiting a vulnerability resulting in a loss.

25
Q

What is a Threat?

A

Any circumstance/event that has the potential to compromise CIA.

26
Q

What is a Security Incident?

A

An adverse event/series of events that can negatively affect the CIA of an organization’s IT.

27
Q

What is Risk Mitigation?

A

The methods used to reduce the chances that a threat will exploit a vulnerability or the impact that the risk will have on the organization if it does occur.

28
Q

What are Control Categories?

A

They describe how particular controls work.

29
Q

What are Technical Controls?

A

They use technology (e.g. hardware, software, and firmware) to reduce risk.

30
Q

What are Managerial Controls?

A

They are primarily administrative in function. They are typically documented in an organization’s security policy and focus on managing risk.

31
Q

What are Operational Controls?

A

They help ensure that the day-to-day operations of an organization comply with security policy. People implement them.

32
Q

What are Physical Controls?

A

They impact the physical world (e.g locks on doors, fences, security guards).

33
Q

What are Control Types?

A

They describe the goal the control is meant to achieve.

34
Q

What are Preventive Controls?

A

These controls attempt to prevent an incident from occurring.

35
Q

What are Detective Controls?

A

These controls attempt to detect incidents after they have occurred.

36
Q

What are Corrective Controls?

A

These controls attempt to restore normal operations after an incident occurs.

37
Q

What are Deterrent Controls?

A

These controls attempt to discourage individuals from causing an incident.

38
Q

What are Compensating Controls?

A

These are alternative controls used when primary controls are not feasible (e.g. using a tmp account for new hires).

39
Q

What are Directive Controls?

A

These are controls that provide instruction to individuals on how they should handle security related situations that arise.

40
Q

What are some examples of Technical Controls?

A

Encryption, Antivirus software, IDSs & IPSs, Firewalls, and the least privilege principle.

41
Q

What are examples of Managerial Controls?

A

Risk assessments and vulnerability assessments.

42
Q

What are examples of Operational Controls?

A

Awareness and training, configuration management, and media protection.

43
Q

What are examples of Physical Controls?

A

Any control that can be physically touched such as locks, fences, vestibules, etc.

44
Q

What are some examples of Preventive Controls?

A

Hardening, training, security guards, account disablement process, or IPSs.

45
Q

What are examples of Deterrent Controls?

A

Warnings signs and login banners.

46
Q

What are examples of Detective Controls?

A

Log monitoring, Security Information and Event Management (SIEM) systems. security audits, video surveillance, motion detection, or IDSs.

47
Q

What are examples of Corrective Controls?

A

Backups & system recovery and incident handling processes.

48
Q

What are examples of Compensating Controls?

A

A new hire cannot use the primary method of authentication, so they need to use a TOTP in the meantime.

49
Q

What are examples of Directive Controls?

A

Policies, standards, guidelines, and change management.

50
Q

What are Logs?

A

Logs are entries that help identify what happened, when it happened, where it happened, and who/what did it.

51
Q

What is a Security Information and Event Management (SIEM) system?

A

SIEM provides a centralized solution for collecting, analyzing, and managing data from systems, applications, and infrastructure devices.

52
Q

What is Security and Event Management (SEM)?

A

SEMs provide real-time monitoring, analysis, and notification of security events.

53
Q

What is Security Information Management (SIM)?

A

SIMs provide long-term storage of data, along with methods of analyzing the data for trends or creating reports needed to verify compliance with laws and regulations.

54
Q

What is Syslog?

A

A syslog protocol specifies a general log entry format and details how to transport log entries.

55
Q

What is an Originator? (in the context of Syslog)

A

Any system sending syslog messages.

56
Q

What is a Collector? (in the context of Syslog)

A

Any device that receives syslog messages.