Cornerstone security principles Flashcards

1
Q

The 3 main objectives of security are

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is information security?

A

The protection of information and information systems from unauthorized access, use,disclosure,modification,or destruction in order to provide confidentiality,integrity and availability (CIA triad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and properietary information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Guarding against improper information modification, and includes ensuring information non-repudiation and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Ensuring timely and reliable access and use of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 key cyber security tenets

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality, integrity and availability (CIA) versus

A

Disclosure, Alteration and Destruction (DAD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identification

A

-provides a weak an unproven claim of identity. -providing a username would be an example of identification. -Requires proof(authentication) prior to being granted access (authorization) to controlled data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication

A

-Serves as proof a user’s identity claim is legitimate. -Strong authentication implies higher integrity means of proof or multiple methods of proof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authorization

A

Proceeds after successful authentication and determines what the authenticated user can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Accounting

A

-Details the interaction performed by individuals. -Audit logs could be generated allowing users to be held accountable for their documented actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types/categories of authentication

A

-Something you have (such as token, smart card, or badge) -Something you are (biometrics: fingerprint, retina scan, voice, palm scans, hand geometry) -Something you know (passwords or phrases) -Something you are (such as GPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Using two or more categories of authentication are called

A

Two-factor or multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PoLP abbreviation of

A

Principle of least privilege and may also known as Minimum Necessary Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mandates individuals only be granted access necessary to perform their required functions

A

Principle of least privilege or Minimum Necessary Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk is mitigated by requiring two parties to perform what one person could.

A

Separation of Duties. -It serves as a check on excessive authority.

17
Q

Require collusion among more than one individual in order to successfully perpetrate a fraud.

A

Separation of Duties

18
Q

Force other people to be in charge of carrying out key tasks normally performed by another employee

A

Rotation of Duties or job rotation. -it is a common way of detecting fraud associated with printing excess payroll checks.

19
Q

Acting as any reasonable person would.

A

Due Care or Prudent Man Rule

20
Q

Practices or processes that ensure the decided upon standard of care is maintained

A

Due Diligence

21
Q

The implementation of due care is

A

Due Diligence

22
Q

What are major types of controls?

A

-Preventive -Detective -Corrective -Deterrent -Recovery -Compensating

23
Q

Preventive Controls

A

-Try to prevent an attack from being successful. -Will not allow a user to violate the security policy in place.

24
Q

Detective Controls

A

-Assumes an attack has begun -Tries to detect that is a problem after an attack occurs -Time-critical with detection-an attack is occurring

25
Deterrent Controls
Discourages security violations
26
Compensating Controls
Used to shore up identified deficiencies in existing controls
27
Corrective Controls
Reacts to an attack and takes corrective action for data recovery
28
Recovery Controls
Restores the operating state to normal after an attack or system failure
29
Intrusion Detection IDS and Monitor sensors, job rotation, Threat-haunting and CCTV are example of
Detective Controls
30
The access control measures could be categorized by
Administrative, Technical, or Physical
31
Background checks, policies and procedures are example of
Administrative (directive) Controls
32
Encryption and smart cards are example of
Technical controls
33
Locks , securing laptops, securing magnetic media and the protection of cable
Physical controls
34
“Beware of dogs” or “Use of deadly force is authorized” signs are example of
Deterrent Controls