Chapter 1 Security Fundamentals Flashcards
What are the three components of the CIA triad?
The three components of the CIA triad are confidentiality (where the data is encrypted), integrity (where the data uses hashing), and availability (where the data is available, for example, by restoring data from a backup).
Why might an inactive CCTV camera be placed on the outside wall of a building?
An inactive CCTV camera could be used as a deterrent since criminals would not know that it is inactive.
What does confidentiality mean?
Confidentiality means preventing other people from viewing the data; the best way to keep data confidential is to encrypt it.
How can you control access of personnel to a data center?
The best way to control entry into a data center is to install a mantrap
What is the purpose of an air gap?
The purpose of an air gap is to prevent data theft by removing physical connections between the device and network. The only way to insert or remove data from an air-gapped machine is with removable media like a USB drive
Name three main control categories.
The three control categories are managerial, operational, and technical.
Name three physical controls.
Any three of the following physical controls will apply: Lighting, cameras, robot sentries, fences, gate signage, industrial camouflage, security guards, badges, key management, proximity card, tokens, biometric locks, electronic locks, burglar alarms, smoke detectors, internal protection, conduits, HVAC, cable locks, airgap, laptop safe, USB data blocker, vault, and Faraday cage.
Following an incident, what type of control will be used when researching how the incident happened?
Researching an incident requires detective controls wherein all the evidence is gathered and analyzed.
How do you know whether the integrity of your data is intact?
Hashing provides data integrity where the hash value is measured before and after accessing data. If the values match, it has integrity.
What is a corrective control?
Corrective controls are the actions you take to recover from an incident. You may have to restore data from a backup.
What type of control is it when you change the firewall rules?
Firewall rules are designed to mitigate risk. They are technical controls
What is used to log in to a system that works in conjunction with a PIN?
A smart card, a CAC card, or a PIV card are all used in conjunction with a PIN.
What is the name of the person who looks after classified data? Who gives people access to the classified data?
In a MAC model, the custodian stores and manages the data. The administrator grants access to the data.
When you use a DAC model for access, who determines who gains access to the data?
In a DAC environment, the data owner decides who has access to the data.
What is least privilege?
Least privilege is the process of giving an employee minimal permissions to perform their job.