CyberS C2 Flashcards
Explain the three dimensions of the Cybersecurity Cube
The three dimensions of the Cybersecurity Cube are:
1. Principles of Security: Foundational principles (CIA - Confidentiality, Integrity, Availability).
2. States of Data: Data at Rest, Data in Transit, Data in Process.
3. Cybersecurity Safeguards: Technologies, Policies and Practices, People.
What are the foundational principles of the cybersecurity world, and why are they important?
The foundational principles are Confidentiality, Integrity, and Availability (CIA). They are crucial for prioritizing actions in protecting the cyber world.
Define the three states of data in the Cybersecurity Cube.
The three states of data are Data at Rest, Data in Transit, and Data in Process.
Describe the principles of the CIA TRIAD and their significance in cybersecurity.
CIA TRIAD comprises Confidentiality, ensuring non-disclosure; Integrity, ensuring accuracy; and Availability, maintaining access. They are fundamental to cybersecurity, providing a comprehensive approach to safeguarding information.
How does access control contribute to maintaining confidentiality?
Access control defines protection schemes, including Authentication, Authorization, and Accounting (AAA). It prevents unauthorized access and ensures proper authorization, contributing to maintaining confidentiality.
Explain the importance of data integrity in different organizational contexts.
Data integrity ensures accuracy, consistency, and trustworthiness of data. In organizations, it is crucial for maintaining reliable transactions, accounts, and overall data reliability.
RAD
Differentiate between Data at Rest, Data in Transit, and Data in Process.
- Data at Rest: Stored data.
- Data in Transit: Data transmission between devices.
- Data in Process: Data during initial input, modification, computation, or output.
What are the methods used to protect data integrity in the Data at Rest state?
Methods include hashing, data validation checks, data consistency checks, and access controls.
Explain the role of Software-based Technology Safeguards in cybersecurity.
Software-based safeguards protect operating systems, databases, and other services through programs and services.
How do Cybersecurity Policies contribute to an organization’s security posture?
Cybersecurity Policies set security objectives, rules of behavior, and system requirements, ensuring the overall security of a network, data, and computer systems.
Describe the role of the ISO Cybersecurity Model in information security management
The ISO Cybersecurity Model provides a comprehensive framework for information security management, guiding professionals in securing information from end-to-end.
How does the ISO model address security objectives for data in different states?
The ISO model identifies different groups within an organization responsible for data in various states, addressing security objectives for each state.