Chapter 1 Mod 1 Flashcards

Security Concepts of information Assurance, Risk Management Process, Security Controls, Governance Elements and Processes, ISC2 Code of Ethics

1
Q

How does the CIA triad help in defining security, and why are these terms considered relevant and meaningful?

A

The CIA triad helps define security by focusing on Confidentiality, Integrity, and Availability, making security more understandable to management and users, and providing a clear purpose for security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the context of Confidentiality, what challenge do security professionals face when dealing with system users who are guests or customers?

A

Regulating access to protected data whilst permitting access to authorized users, especially when users may access the system from compromised devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Personally Identifiable Information (PII), and how does it relate to the area of confidentiality?

A

Personally Identifiable Information (PII) refers to any data about an individual that could be used to identify them. It relates to confidentiality as it involves protecting sensitive information about individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is sensitivity defined in the context of confidentiality, and what role does it play?

A

Sensitivity is a measure of the importance assigned to information by its owner, denoting its need for protection.

Sensitive information, if improperly disclosed or modified, could harm an organization or individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Integrity measure, and how does it apply to data, systems, organizations, and people?

A

Integrity measures the degree to which something is whole, complete, internally consistent, and correct. It applies to data, systems, organizations, and people – ensuring accuracy and consistency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Data integrity encompass, and why is it crucial for information?

A

Data integrity is the maintenance, assurance, accuracy and consistency of data over its life-cycle.

It is crucial for information to be free from improper modification, errors, or loss, ensuring its completeness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is the internal consistency of information relevant to data integrity?

A

The internal consistency of information ensures that information is correct on all related systems, displayed, and stored uniformly. It is a part of data integrity, requiring all instances of data to be identical in form, content, and meaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is system integrity?

A

System integrity refers to maintaining a known good configuration and expected operational function.
To achieve this, maintaining a baseline (current state) and ensuring that the system always continues to be protected through transactions is crucial.

IBM definition: An operating system is said to have system integrity when it is designed, implemented and maintained to protect itself against unauthorized access, and does so to the extent that security controls specified for that system cannot be compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is availability defined

A

Availability is defined as timely and reliable access to information and the ability to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is availability not necessarily about systems and data being available 100% of the time?

A

Availability is not necessarily about systems and data being available 100% of the time. Instead, it means that systems and data meet the business requirements for timely and reliable access. Criticality is associated with availability, representing the importance an organization gives to data or an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the foundational principles of the cybersecurity domain, and why is a comprehensive approach to maintaining them important?

A

The foundations of the cybersecurity domain are Confidentiality, Integrity, and Availability (CIA Triad). A comprehensive approach to maintaining them is crucial for ensuring robust cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the concept of Confidentiality

why is it essential to protect personally identifiable information (PII)?

A

Confidentiality ensures that no private information is disclosed to unauthorized individuals.

It is essential to protect PII to safeguard the assets and information of large corporations or individuals, especially in sectors like banking, health care, or insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of a security team in terms of confidentiality, and what is their goal?

A

The role of a security team is to protect assets or information. Their goal is to ensure the confidentiality of information, particularly safeguarding multiple personal identifiers in sectors like banking, health care, or insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Integrity and its significance in information security.

A

Integrity ensures that information is not corrupted or changed without the owner’s permission. It confirms that the information is complete, accurate, and consistent with its legitimate use, playing a crucial role in information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the potential ramifications of interfering with the integrity of information?

A

financial losses, reputational damage, legal prosecution troubles, regulatory fines, and a profound erosion of consumer trust.

Interference can include suppressing, modifying, adding, transmitting, editing, deleting or otherwise damaging data, systems, and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary responsibility mentioned in the text regarding information security?

A

The primary responsibility is to maintain the security of information, ensuring that no one, unless authorized, changes any part of the protected information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is Availability critical, and what can disrupt the availability of data?

A

Availability is critical because authorized users must have timely access to important information.

Cyberattacks, particularly ransomware attacks, can disrupt the availability of data by locking up systems and blocking access to vital information and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In the context of a ransomware attack, how is access typically restored?

A

Access is typically restored after making a payment in response to the ransomware demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of authentication, and how is it defined ?

A

The purpose of authentication is to validate that users are the rightful owners of the stated identity. Authentication is defined as the process of verifying or proving the user’s identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the three common methods of authentication mentioned in the text.

A

The three common methods of authentication are:

Something you know: Passwords or passphrases
Something you have: Tokens, memory cards, smart cards
Something you are: Biometrics, measurable characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain the concept of “Something you know” in the context of authentication.

A

“Something you know” refers to authentication using passwords or passphrases. Users prove their identity by providing knowledge that only the rightful owner of the identity should possess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Provide examples of “Something you have” in the authentication process.

A

Examples of “Something you have” include tokens, memory cards, and smart cards. These physical items contribute to the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define “Something you are” and provide an example mentioned in the text.

A

“Something you are” refers to authentication using biometrics, measurable characteristics. An example mentioned in the text could be fingerprint or facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is it important to validate the identity of the requestor during authentication?

A

It is important to ensure that the requestor is the rightful owner of the stated identity, and validating this identity during authentication helps achieve that goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does authentication contribute to the overall security of systems?

A

Authentication contributes to overall security by preventing unauthorized access. It ensures that only individuals with the rightful ownership of the identity can gain access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In a practical scenario, how might a user prove their identity through the “Something you have” method?

A

A user might prove their identity through the “Something you have” method by presenting a token, memory card, or smart card during the authentication process.

27
Q

Define single-factor authentication (SFA) and multi-factor authentication (MFA) based on the text.

A

Single-factor authentication (SFA) involves using only one of the authentication methods, while multi-factor authentication (MFA) requires users to demonstrate two or more authentication methods.

28
Q

What is a common best practice when it comes to implementing authentication techniques, and how many of the three common techniques should be implemented?

A

A common best practice is to implement at least two of the three common techniques for authentication: Knowledge-based, Token-based, and Characteristic-based.

29
Q

Describe knowledge-based authentication and provide an example of it.

A

Knowledge-based authentication uses a passphrase or secret code to differentiate between an authorized and unauthorized user. An example is having a personal identification number (PIN) or a password known only to the user.

30
Q

What is a potential vulnerability associated with knowledge-based authentication, as mentioned in the text?

A

Knowledge-based authentication, when used alone, is often vulnerable to attacks. For example, a call to the help desk for a password reset may pose a challenge in ensuring that the password is reset only for the correct user and not someone pretending to be that user.

31
Q

Why does combining a user ID and a password not qualify as multi-factor authentication (MFA)?

A

Combining a user ID and a password consists of two things that are known, and it does not meet the requirement of using two or more of the authentication methods stated, thus not considered MFA.

32
Q

Explain the concept of multi-factor authentication (MFA) and why it is considered a more secure approach.

A

Multi-factor authentication (MFA) requires users to demonstrate two or more authentication methods, such as knowledge-based, token-based, or characteristic-based. It is considered more secure because it adds layers of verification, making it harder for unauthorized access.

33
Q

Provide an example scenario where multi-factor authentication (MFA) could enhance security.

A

In a scenario where a user requests a password reset, combining knowledge-based authentication with another form of authentication like token-based or characteristic-based would enhance security by adding an additional layer of verification.

34
Q

Why is the combined use of a user ID and a password not considered multi-factor authentication (MFA)?

A

The combined use of a user ID and a password consists of two things that are known, and it does not meet the requirement of using two or more of the authentication methods stated, thus not qualifying as multi-factor authentication (MFA).

35
Q

What are the two factors of authentication mentioned in the text, and can you provide examples of each?

A

The two factors of authentication mentioned are something you know (e.g., password or passphrase) and something you have (e.g., token or card).

36
Q

How does biometrics contribute to multifactor authentication, and what are some examples of measurable characteristics mentioned in the text?

A

Biometrics, such as fingerprints, facial recognition, or iris scans, contribute to multifactor authentication by adding a third factor based on something you are.

37
Q

Provide an everyday example from the text where biometrics is used in the authentication process.

A

The text mentions using biometrics like facial recognition or an iris scan as part of the authentication process. An everyday example could be unlocking a smartphone using facial recognition.

38
Q

In the context of multifactor authentication, how does the combination of something you have and something you know enhance security?

A

The combination of something you have (e.g., a card) and something you know (e.g., a PIN) enhances security in multifactor authentication by requiring possession of a physical item along with knowledge, making it more challenging for unauthorized access.

39
Q

Why does biometrics adds another layer of multifactor authentication?

A

Biometrics, such as fingerprints or facial recognition, adds another layer of multifactor authentication because it involves a unique measurable characteristic, providing a third factor beyond something you know and something you have.

40
Q

How does the use of biometrics, contribute to the everyday authentication process?

A

elements like fingerprints or facial recognition are part of the everyday authentication process, emphasizing the increasing use of biometrics as a means of verifying identity.

41
Q

Can you describe a real-world scenario where the combination of all three factors of authentication (something you know, something you have, and something you are) is employed?

A

A real-world scenario could be accessing a high-security facility where individuals are required to provide a password (something they know), use a smart card (something they have), and undergo a biometric scan (something they are) for entry.

42
Q

How is non-repudiation defined, and what is its purpose in the context of information security?

A

Non-repudiation is a legal term defined as protection against an individual falsely denying having performed a particular action. Its purpose in information security is to provide the capability to determine whether an individual took a specific action, preventing denial of actions like creating information or approving messages.

43
Q

In the world of e-commerce and electronic transactions, why is non-repudiation important, as mentioned in the text?

A

In e-commerce and electronic transactions, non-repudiation is crucial to prevent impersonation or denial of actions such as making a purchase online. It ensures trust in online transactions by holding individuals responsible for the transactions they conduct.

44
Q

Can you explain a scenario where non-repudiation might be essential in an online context?

A

An example could be an individual making a purchase online and later denying it. Non-repudiation would be essential in such a scenario to establish and prove the individual’s responsibility for the transaction.

45
Q

How does non-repudiation contribute to trust in online transactions, according to the text?

A

Non-repudiation contributes to trust in online transactions by ensuring that individuals cannot falsely deny their actions. It holds participants accountable for the transactions they conduct, increasing overall trust in the online environment.

46
Q

What are some actions or transactions that non-repudiation methodologies aim to address?

A

Non-repudiation methodologies aim to address actions such as creating information, approving information, and sending or receiving messages, ensuring individuals cannot deny their involvement in these activities.

47
Q

How does non-repudiation protect against the impersonation of others?

A

Non-repudiation protects against the impersonation of others by preventing individuals from falsely denying actions they performed, such as making a purchase online. This ensures that participants are held responsible for their transactions.

48
Q

Why is it emphasized that all participants should trust online transactions, and how does non-repudiation contribute to building this trust?

A

Trust in online transactions is essential for their success. Non-repudiation contributes to building trust by providing a mechanism to verify and establish the authenticity of actions, reducing the risk of denial or impersonation.

49
Q

In the context of non-repudiation, what is the significance of holding individuals responsible for their transactions?

A

Holding individuals responsible for their transactions is significant in non-repudiation as it ensures accountability and prevents individuals from falsely denying their actions. This accountability contributes to the integrity and reliability of online transactions.

50
Q

How is privacy defined in the context of information security, and what distinguishes it from security?

A

Privacy is defined as the right of an individual to control the distribution of information about themselves. While security and privacy both focus on protecting personal and sensitive data, privacy emphasizes the individual’s control over their information.

51
Q

In the context of privacy, what is the difference between security and privacy?

A

While security focuses on protecting personal and sensitive data, privacy is more concerned with the individual’s right to control the distribution of their information. Privacy emphasizes the individual’s autonomy over their personal data.

52
Q

How does the increasing rate of data collection and digital storage impact the push for privacy legislation?

A

The increasing rate of data collection and digital storage across industries contributes to the growing demand for privacy legislation. As more personal information is digitally stored, there is a heightened need for regulations to ensure the proper handling and protection of this data.

53
Q

Why is global privacy a crucial issue, especially when considering personal information’s collection and security?

A

Global privacy is crucial because privacy legislation and data protection regulations can impact corporations and industries worldwide, irrespective of their physical location. It becomes essential to adhere to privacy laws, such as GDPR, which apply to organizations globally.

54
Q

Why is it emphasized that protective security measures alone are not enough to meet privacy regulations?

A

Protective security measures are insufficient to meet privacy regulations because privacy involves more than just safeguarding data. It also requires respecting individuals’ rights and ensuring that data is handled, used, and protected in accordance with applicable privacy laws.

55
Q

How can state legislations within the United States impact companies operating or doing business in the country?

A

State legislations within the United States can regulate the collection and use of consumer data and privacy. Companies operating in the U.S. may need to comply with various state-level laws, in addition to national regulations.

56
Q

What is the role of a member of an organization’s data protection team concerning privacy laws?

A

A member of a data protection team is not required to interpret privacy laws directly but needs to understand how these laws apply to the organization. This includes ensuring that the organization complies with privacy requirements and safeguards personal information in accordance with legal standards.

57
Q

Why is privacy considered a major component of information security, and how does it influence the implementation of appropriate controls?

A

Privacy is integral to information security as it guides the implementation of controls based on the sensitivity of information. Knowing the privacy level helps determine the suitable measures to protect data from unauthorized access and use.

58
Q

In the United States, what legislation governs the privacy of medical information, and what are its key provisions?

A

In the United States, the Health Insurance Portability and Accountability Act (HIPAA) controls the privacy of medical information. Key provisions include ensuring the confidentiality and security of patient information and providing individuals with control over their health information.

59
Q

What role does the General Data Protection Regulation (GDPR) play in the European Union concerning privacy, and how does it impact the control of personal information?

A

GDPR in the European Union grants individuals control over their personal information held by companies. It sets standards for the collection and retention of personal data, emphasizing the importance of informed consent and data protection.

60
Q

As a security professional, why is it important to be aware of privacy laws and regulations in all jurisdictions where a company conducts business?

A

Security professionals need to be aware of privacy laws globally to ensure that information security practices align with legal standards in each jurisdiction. This awareness helps in adapting controls to comply with diverse privacy standards.

61
Q

When doing business in other countries, why is it crucial for security professionals to be aware of and adhere to the privacy standards and regulations of those countries?

A

Security professionals must align with the privacy standards of other countries to respect local regulations and safeguard individuals’ rights. Adhering to diverse privacy requirements is essential for ethical and legal business practices.

62
Q

How do standards, policies, and procedures contribute to governing privacy in the working environment?

A

Standards, policies, and procedures play a crucial role in governing privacy by providing a framework for implementing controls. They guide organizations in establishing consistent practices to protect sensitive information in the working environment.

63
Q

Discuss the significance of informed consent in the context of privacy laws and regulations.

A

Informed consent is significant in privacy laws as it ensures individuals are aware of and agree to the collection and use of their personal information. It emphasizes transparency and empowers individuals to make informed decisions about how their data is handled.

64
Q

How can a security professional balance the implementation of controls to ensure information security while respecting privacy laws?

A

Balancing information security and privacy involves tailoring controls based on the sensitivity of information and adhering to legal requirements. Security professionals need to adopt a risk-based approach, considering both security and privacy implications in their decision-making processes.