Chapter 1: Mastering Security Basics Flashcards

1
Q

What are the 3 main components of the “security triad” (CIA)?

A

Confidentiality, Integrity, Availabillity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a “use case”?

A

A series of steps taken to complete a process by following a specific Place Order (basically a checklist). (This order can follow a Normal Flow where steps are done in a specified order, or Alternate flow where steps are repeated or done in a random manner.)

Eg: In an e-commerce use case, elements might include:
Actor: Lisa is shopping online
Precondition: Lisa needs to select an item to buy before she can place an order
Trigger: Lisa clicks on her shopping cart to begin the purchase process
Postcondition: Lisa’s order enters into the system, she might be billed, the item is shipped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What prevents the unauthorised disclosure of data?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What method is used to scramble data to make it unreadable by unauthorised personnel?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does PII stand for?

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can be used to grant and/or restrict specific users access to specified data?

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 key elements used as Access Controls?

A

Identification, Authentication, Authorisation

Eg. Identification = an identity claimed by a user with a unique username
Authentication = a password
Authorisation = use of permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What confidentiality method is the practice of hiding data within data?
(Hiding data in plain sight)

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What confidentiality methods attempt to make something unclear or difficult to understand?
(Security through obscurity)

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What provides assurances that data has not changed/modified/tampered with/corrupted?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call a number created by executing a type of algorithm against data, such as a file or a message?

A

A hash (Hashing)

By comparing hashes created at two different times, you can determine if the original data is still the same. If the hashes are the same, the data is the same. If the hashes are different, the data has changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can verify the integrity of emails and files and also provide authentication and non-repuditation?
(These require certificates.)

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What indicates that data and services are available when needed?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some common examples of fault-tolerance?

A
- Disk redundancies
(RAIDs)
- Server redundancies
(failover clusters)
-Load Balancing 
(multiple servers for single service)
-Site redundancies
(alternate hot or cold sites in case of natural disasters)
-Backups
(data can be restored)
-Alternate power
(UPSs/power generators)
-Cooling systems
(HVAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss?

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What would you call any circumstance or event that has the potential to compromise confidentiality, integrity, or availability?

A

A Threat

17
Q

What is another word for a weakness that’s often used in the world of IT Security?

A

A Vulnerability

18
Q

What is an adverse event or series of events that can negatively affect the confidentiality, integrity or availability of an orgainisation’s IT systems and data?

A

A Security Incident

19
Q

What can be used to reduce the chance that a threat will exploit a vulnerability?

A

Risk Mitigation

also sometimes called countermeasures or safeguards

20
Q

What are some examples of Technical controls?

A
  • Encryption
  • Antivirus software
  • IDSs and IPSs
  • Firewalls
  • Least privelege