Chapter 1 - Today's Cybersecurity Analyst Flashcards

How to assess cybersecurity threats, as well as how to evaluate and select controls to keep your networks and systems secure.

1
Q

Confidentiality

A

Ensures that unathorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

A weakness in a device, system, application, or process that might allow an attack to take place. Internal factors that may be controlled by cybersecurity professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

An outside force that may exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversarial Threats

A

Individuals, groups, and organizations that are attempting to deliberately undermine the security of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accidental Threats

A

Occur when individuals doing their routine work mistakenly perform an action that undermines security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Structural Threats

A

Occur when equipment, software, or environmental controls fail due to the exhaustion of resources, exceeding their operational capability or simply failing due to age.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Environmental Threats

A

Occur when natural or human-made disasters occur that are outside the control of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Access Control (NAC) Solutions

A

Help security professionals achieve two cybersecurity objectives: limiting network access to authorized individuals and ensuring that systems accessing the organization’s network meet basic security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Firewalls

A

Sit at the boundaries between networks and provide perimeter security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Segmentation

A

Uses isolation to separate networks of differing security levels from each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hardening Configurations

A

Includes disabling unnecessary services on endpoints to reduce their susceptibility to attack, ensuring that secure configuration settings exist on devices, and centrally controlling device security settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Patch Management

A

Ensures that operating systems and applications are not susceptible to known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Group Policy

A

Allows the application of security settings to many devices simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Endpoint Security Software

A

Protects against malicious software and other threats.

17
Q

NIST Process for Pen Testing

A
  1. Planning
  2. Discovery
  3. Attack
  4. Reporting
18
Q

Penetration Testing Results

A

Valuable security planning tools that describe the actual vulnerabilities that an attacker might exploit to gain access to a network.

19
Q

Sandboxing

A

An approach used to detect malicious software based on its behavior rather than its signatures.

20
Q

Area of great promise for future cybersecurity analytics tools

A

The continued adoption of machine learning techniques designed to automatically extract knowledge from the voluminous quantity of information generated by security systems.

21
Q

Privacy

A

Focuses on the ways that an organization can use and share information that has been collected about individuals (PII).

22
Q

Generally Accepted Privacy Principles (GAPP)

A
  1. Management
  2. Notice
  3. Choice and consent
  4. Collection
  5. Use, retention, and disposal
  6. Access
  7. Disclosure
  8. Security
  9. Quality
  10. Monitoring and enforcement
23
Q

Risk

A

The combination of a threat with a corresponding vulnerability.

24
Q

802.1X Protocol

A

A common standard used for NAC

25
State Inspection Firewall
Maintains information about the state of each connection passing through the firewall. Most basic firewalls sold as stand-alone productions.
26
Next-Generation Firewalls (NGFWs)
Incorporate information into their decision making process including contextual information about users, applications, and business processes. Current state-of-the-art in network firewall protection.
27
Web application firewalls (WAFs)
Specialized firewalls designed to protect against web application attacks, such as SQL injection and XSS
28
Honeypots
Systems designed to appear to attackers as lucrative targets due to the services they run, vulnerabilities they contain, or sensitive information they appear to host.
29
DNS Sinkhole
Feed false information to malicious software that works its way onto the enterprise network.