Definitions Flashcards

1
Q

Payment Card Industry Data Security Standard (PCI-DSS)

A

Applies to companies that process credit card payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HIPPA

A

applies to healthcare and patient records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Federal Information Security Management Act (FISMA)

A

Security standards for many federal agencies in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the CIA Triad consist of?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Confidentiality?

A

Ability to protect our data from those who are not authorized to view it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Integrity?

A

ability to prevent changing data in an unauthorized manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Availability?

A

ability to acecss data when we need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the CIA triad relate to security?

A

Allows us to discuss security measures in more detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three addtional principals in the Parkerian Hexad?

A

Control, Authenticity, and Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Control?

A

the physical possession of the media that data is stored on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authenticity

A

Whether the data is attributed to the right owner or creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Utility?

A

How useful the data is to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four categories of attacks?

A

Interception, interruption, modification, and fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which attacks affect the confidentiality of the CIA triad?

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which attacks affect the integrity of the CIA triad?

A

Interruption, modification, fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which attacks affect the availability of the CIA triad?

A

Interruption, modification, fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an interception attack?

A

allows unauthorized users to access data, applications or environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Are interception attacks primarily against confidentiality, integrity, or availability?

A

Primarily against confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an example of an interception attack?

A

eavesdropping on a call or reading someone else’s emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an interruption attack?

A

makes your assets unusuable or unavailable to you on a temporary or permanent basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Are interruption attacks primarily against confidentiality, integrity, or availability

A

Primarily affect availability, but can affect integrity as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an example of a interruption attack?

A

a DoS attack on a mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Modification Attack?

A

it involves tampering with assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Are modification attacks primarily against confidentiality, integrity, or availability?

A

primarily on integrity, but could also affect availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is an example of a modification attack?

A

unauthorized access to a file and then altering the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Fabrication Attack?

A

generating data, processes, communications, etc. in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Are fabrication attacks primarily against confidentiality, integrity, or availability?

A

primarily affect integrity, but could affect availability as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is data at rest?

A

data not in the process of being moved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is an example of data at rest?

A

hard drive or flash drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is data at rest protected with?

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is data in motion?

A

data that is moving from one place to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

whats an example of data in motion?

A

sensitive data moving between your browser and the bank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is data in use?

A

data that is actively being accessed or modified

34
Q

What is data in use protected with?

A

permissions and authentication of users

35
Q

What is a threat?

A

something that has the potential to cause harm

36
Q

What is a vulnerability?

A

Weaknesses or holes that threats can exploit

37
Q

What is a risk?

A

the likelihood that something bad will happen

38
Q

What two things do you need in order for a risk to be possible?

A

a threat and a vulnerability

39
Q

What is impact?

A

determines risks based on the value of an Asset

40
Q

What does risk management do?

A

it compensates for risks in your environment

41
Q

What are the 5 processes for risk management?

A

Identify assets, Identify threats, Assess Vulnerabilities, Assess Risks, Mitigate Risks

42
Q

What does Identify assets mean?

A

Make an accurate determination of which assets are truly critical

43
Q

What does Identify Threats mean?

A

identifying the threats that might affect the critical assets

44
Q

What things do you need to be concerned with in the identify threats stage?

A

losing data
maintaining accurate data
keeping the system up and running

45
Q

What does assessing vulnerabilities mean?

A

Assessing the vulnerability in the context of potential threats

46
Q

What does assessing risks means?

A

making sure that there is both a threat and a vulnerability present

47
Q

What disqualifies a risk?

A

no vulnerability with matching threat or no threat with a matching vulnerability

48
Q

How do you mitigate risks?

A

by putting controls in place to account for each threat

49
Q

What are the three types of controls?

A

physical, logical, and administrative

50
Q

What do physical controls do?

A

protects the physical environment where the systems or data is stored

51
Q

What are some examples of physical controls?

A

fences, gates, locks

52
Q

What do logical controls do?

A

protects the systems, networks, and evironments that interact with the data

53
Q

what are examples of logical controls?

A

passwords, encyrptions, firewalls, IDS

54
Q

What do administrative controls do?

A

dictates how the users in the environment should behave

55
Q

What are some examples of adminstrative controls?

A

rules, laws, policies or guidelines

56
Q

What is an incident response?

A

Reactions based on documented incident response plans

57
Q

What’s important to do with these response plans?

A

should be reviewed regularly, tested, and practiced by those enacting them

58
Q

What are the four processes of the incident response plan?

A

Prepartion, detection and analysis, containment, eradication, recovery, and post-incident activity

59
Q

What happens during the preparation stage?

A

creating policies and procedures, training and education, developing and maintaining documentation

60
Q

What happens during the detection and analysis phase?

A

detects an issue, decide on whether its an incident, and repond appropriately

61
Q

what tools are used during the detection phase?

A

Intrusion detection system (IDS)
Antivirus software (AV)
firewall logs
proxy logs

62
Q

What happens during the analysis phase?

A

decides what contitutes an incident, evaluate criticality, contacting additonal resources if needed

63
Q

What does Containment mean?

A

ensuring the situation doesnt cause more damage

64
Q

What are examples of what to do for containment?

A

disconnecting the server, firewall rules in place, updating signatures on the IDS

65
Q

What does eradication mean?

A

removes the effect of the issue from the enviroment

66
Q

What are examples of what to do for eradication?

A

scanning other hosts for malware, examing logs on the server or network to remove malware

67
Q

What does recovery entail?

A

restoring devices or data from backup media, rebuilding systems, reloading applications

68
Q

What is the Post-Incident activity do?

A

determines exactly what happened, why, and prevention

69
Q

What is defense in depth?

A

multilayerd defense that will still be succesful should a defensive measure fail

70
Q

What are some layers you might have in place?

A

data, application, host, internal network ,and external network

71
Q

why is it important to have defenses at each layer?

A

makes it difficult for attackers to penetrate the network and directly attack assets

72
Q

What is the goal of defense in depth?

A

to notice an attack in progress and have time to prevent it

73
Q

How can you add complexity to the defensive model?

A

physical defenses, making policies, and user awareness/training

74
Q

What defenses would you use for the external layer?

A

DMZ, VPN, Logging

75
Q

What defenses would you use for the network perimeter?

A

Firewalls, Proxy servers, logging

76
Q

What defenses would you use for the internal network?

A

IDS, IPS, Logging, Auditing

77
Q

What defenses would you use for the Host?

A

Authentication, Anti-virus, Passwords, Hashing

78
Q

What defenses wold you use for the Application?

A

SSO, Content filtering, Data Validation

79
Q

What defenses would you use for Data?

A

Encryption, Access controls, backups

80
Q

What is penetration testing?

A

method of finding gaps in your security using attacks that an attacker would use