CyberS C2 Flashcards

1
Q

Explain the three dimensions of the Cybersecurity Cube

A

The three dimensions of the Cybersecurity Cube are:
1. Principles of Security: Foundational principles (CIA - Confidentiality, Integrity, Availability).
2. States of Data: Data at Rest, Data in Transit, Data in Process.
3. Cybersecurity Safeguards: Technologies, Policies and Practices, People.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the foundational principles of the cybersecurity world, and why are they important?

A

The foundational principles are Confidentiality, Integrity, and Availability (CIA). They are crucial for prioritizing actions in protecting the cyber world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define the three states of data in the Cybersecurity Cube.

A

The three states of data are Data at Rest, Data in Transit, and Data in Process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the principles of the CIA TRIAD and their significance in cybersecurity.

A

CIA TRIAD comprises Confidentiality, ensuring non-disclosure; Integrity, ensuring accuracy; and Availability, maintaining access. They are fundamental to cybersecurity, providing a comprehensive approach to safeguarding information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does access control contribute to maintaining confidentiality?

A

Access control defines protection schemes, including Authentication, Authorization, and Accounting (AAA). It prevents unauthorized access and ensures proper authorization, contributing to maintaining confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the importance of data integrity in different organizational contexts.

A

Data integrity ensures accuracy, consistency, and trustworthiness of data. In organizations, it is crucial for maintaining reliable transactions, accounts, and overall data reliability.

RAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Differentiate between Data at Rest, Data in Transit, and Data in Process.

A
  • Data at Rest: Stored data.
  • Data in Transit: Data transmission between devices.
  • Data in Process: Data during initial input, modification, computation, or output.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the methods used to protect data integrity in the Data at Rest state?

A

Methods include hashing, data validation checks, data consistency checks, and access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the role of Software-based Technology Safeguards in cybersecurity.

A

Software-based safeguards protect operating systems, databases, and other services through programs and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do Cybersecurity Policies contribute to an organization’s security posture?

A

Cybersecurity Policies set security objectives, rules of behavior, and system requirements, ensuring the overall security of a network, data, and computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the role of the ISO Cybersecurity Model in information security management

A

The ISO Cybersecurity Model provides a comprehensive framework for information security management, guiding professionals in securing information from end-to-end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the ISO model address security objectives for data in different states?

A

The ISO model identifies different groups within an organization responsible for data in various states, addressing security objectives for each state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly