Class three Flashcards

1
Q

Identify

A

First step of security framework, identification of your valuable assets - consider all locations in digital landscape, all potential vectors of attack, inherent value of each location. Not necessarily within a network perimeter due to mobile, cloud, and supplier systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protect

A

Second step of security framework, protect with appropriate security using various control types. Categories of control: physical, technical, procedural, legal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Detect

A

Third step of security framework, detect compromised accounts and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Respond

A

Fourth step of security framework, quarantine the problem and identify countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recover

A

Last step of security framework, replace, restore, or otherwise fix compromised assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber defense points

A

Determine where important info is located and where it passes through. Data, devices, applications, systems, networks, communication channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Control types

A

Physical, procedural, technical, and legal security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control modes

A

proactive/preventative, reactive/detective, corrective cyber defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information classification

A

assignment of one or more values to a collection of knowledge to help us understand how alike it is to other sets of knowledge and know the comparative security requirements and priority. CIA for infosec. Sometimes also consent for info on private individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

consent

A

Legal considerations are involved in how personal electronic information can be used and where it can be viewed, stored, transmitted, or otherwise processed. As such, permission is required to specify what info can be collected, where processed, how long retained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality

A

assignment of a value to a set of info to indicate level of secrecy and access restrictions required to prevent unauthorized people from viewing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Integrity

A

value assigned to a set of information to indicate how sensitive it is to degradation of accuracy or data loss (loss of access, not theft). Typically how often to back it up or if it needs a permanent failover system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Availability

A

value assigned to a set of information to indicate how much disruption or outage the owner considers acceptable. Often a time scale. If needs to always be available, redundant failsafe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data as defense point

A

info in digital or electronic format, some security controls can be applied directly to this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Devices as defense point

A

hardware used to create, modify, process, store, or transmit data: computers, smartphones, USB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Applications as defense point

A

software on any device. Usually used to create, modify, process, store, inspect, or transmit info.

17
Q

Systems as defense point

A

groups of applications for a complex purpose

18
Q

Networks as defense point

A

group of devices, wiring, and applications that connect, carry, broadcast, monitor, or safeguard data. Can be physical or virtual.

19
Q

Security architect benefits

A

Can help reorganize infosec landscape to make it easier to defend.

20
Q

Physical security

A

Measures designed to deter, prevent, detect, or alert unauthorized real-world access to a site or material item.

21
Q

Technical control

A

use of electronic or digital method to influence or command how something like a digital device can or cannot be used. Eg removing ability to cut and paste on smartphone.

22
Q

Procedural control

A

instruction during a sequence of required steps to limit how something is or is not permitted to be used. Eg: minimum of 2 authorized persons to approve access request.

23
Q

Legal control

A

legislation to promote and invest in positive security methods and deter, punish, and correct infringements.

24
Q

Advanced persistent threats (APTs)

A

term used to describe tenacious and highly evolved set of tactics used by threat actors to infiltrate networks through digital devices and leave malicious software in place for as long as possible.