Chapter 3 Module 1 Flashcards

1
Q

Security Control

A

A control is a safeguard or countermeasure designed to preserve Confidentiality, Integrity and Availability of data. ( CIA Triad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control

A

Access Control involves limiting what objects can be available to what subjects according to what rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall

A

An example of Security Access Control, is included in a system or network to prevent something from
The outside from coming in and disturbing or compromising the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Subject

A

Can be defined as an entity that requests access to our assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A subject

A

Is a user, a process, a procedure, a client ( or a server), a program, a device such as an endpoint, workstation, smartphone or removable storage device with onboard firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Object

A

Anything that a subject attempts to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An object:

A

Is a building, a computer, a file, a database, a printer or scanner, a server , a communications resource, a block of memory, an input/output port, a person, a software task, thread or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Rule

A

Is an instruction developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall

A

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layered Defense

A

The use of multiple controls arranged in series to provide several consecutive controls to protect an asset;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defense in depth

A

Describes an information security strategy that integrates people, technology and operations capabilities to establish variable barriers across multiple layers and missions of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Principle of Least Privilege

A

The principle that users and programs should have only the minimum privileges necessary to complete their tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privileged access management

A

Is based on the principle of least privilege, meaning each user is granted access only to the items they need and nothing further.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

User provisioning

A

The process of creating, maintaining and deactivating user identities on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encrypt

A

To protect private information by putting it into a form that can only be read by people who have permission to do so.

17
Q

Privileged accounts

A

An information system account with approved authorizations of a privileged user.