Domain 1 Flashcards
What should be the primary focus for Web services?
Availability
Integrity
How can we protect the Integrity?
We can protect Integrity by utilizing:
1) Cryptography
2) Checksum (CRC)
3) Hashing (for instance; MD5 SHA1 or SHA2)
4) Digital Signature (prevent from Non-repudiation)
5) Access Control
How do we maintain the availability?
We can maintain and protect the Availability by implementing and deploying:
1) Installing Intrusion Prevention System (IPS)
Intrusion Detection System (IDS)
2) Regularly performing Patch Management
3) Predict and prepare for Redundancy (power, traffic route, hardware, staff)
What are the basic types of ways for identification and authentication?
Typical authentication methods involve identifying the following -
1) something you know (Username, Password, PIN)
2) something you have(Access cards, Access Tokens, Security Keys etc)
3) something you are (combination of physical or behavioural, for example fingerprint, retina scan, voice recognition, facial recognition)
What are the examples of Physical security?
security guard, access cards, biometrics
What are the examples of Logical security?
IPS
IDS
User Access Authentication
What is the biggest data protection law and privacy law for all individuals in the EU and EEA?
GDPR - General Data Protection Regulation
How much is the fine for violating the GDPR Law?
-20 million Euros or 4% of the annual profit.
What does it mean by Data Owner?
Data owners are Individuals or entities responsible for managing, securing, and controlling specific data within an organization, including defining access, security, and usage policies.
What does it mean by Data Custodian?
Data Custodians are mainly responsible for physically storing, maintaining, and protecting data, including storage, backup, security, maintenance, retention, disposal, and access management.
What is the retention policy?
Typically these are the set of guidelines governing the retention, storage, and disposal of data, specifying data classification, retention periods, data destruction, compliance requirements, and responsibilities.
How do we perform data destruction?
There are several ways to perform data destruction such as;
1) Overwriting: Multiple passes of data overwrites.
2) Degaussing: Magnetic field erasure for magnetic media.
3) Physical Destruction: Shredding, drilling, or burning.
4) Purging - Permanently removing data from a storage system.
What does ABAC stand for?
ABAC stands for Attribute-Based Access Control.
What is privilege creep?
When people get more access than they need to do their duties.
What is the best way to prevent privilege creep?
The most effective ways to prevent it will be implementing least privilege and performing regular reviews.
What is MFA?
MFA stands for Multi-factor Authentication.
What is SFA?
SFA means Single-factor Authentication.
What is the difference between MFA and SFA?
MFA enhances security by necessitating multiple authentication factors, whereas SFA relies on a single factor, which makes it less secure.
What is Open Authorization?
It is also known as OAuth and it is a security framework for one online service to access another on behalf of a user without sharing user credentials.
What does DAC mean?
DAC (Discretionary Access Control) means users have discretion to decide who can access their resources and set permissions (e.g., read, write). Access control decisions are decentralized and based on user identities, groups, or roles.
What is an ethical wall?
It mainly separates different parts of an organization to prevent conflicts of interest, maintain confidentiality, and ensure ethical standards.
What is Access control?
It is a system which regulates who can access system resources.