Domain 1 Flashcards

(56 cards)

1
Q

What are the three main components of the CIA Triad?

A

Confidentiality Integrity Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does confidentiality aim to prevent?

A

Unauthorized access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can confidentiality be ensured?

A

Through measures like encryption access control and data classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the focus of integrity in the CIA Triad?

A

Maintaining the reliability and correctness of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples of integrity violations?

A

Unauthorized alterations errors in coding and malicious modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the goal of availability?

A

To ensure authorized access to objects without interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What threats does availability protect against?

A

Denial-of-service attacks device failures and environmental issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the DAD Triad and how does it relate to the CIA Triad?

A

The DAD Triad represents Disclosure Alteration and Destruction highlighting security failures opposite to the goals of the CIA Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the risk associated with overprotection?

A

Excessive security measures can lead to constraints on availability or other security aspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does authenticity ensure?

A

Data originates from its claimed source verifying its integrity and preventing unauthorized alterations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of nonrepudiation in security?

A

To prevent denial of actions or events and hold subjects accountable for their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the elements of AAA services in security?

A

Identification Authentication Authorization and Accounting Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does encryption achieve in security?

A

Hiding the meaning or intent of communication from unintended recipients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are security boundaries and why are they important?

A

Lines between areas with different security requirements crucial for controlling the flow of information and deploying appropriate security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the key principle behind defense in depth?

A

Using multiple security controls in a series to protect against various threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is abstraction in security?

A

Grouping similar elements and assigning security controls collectively for efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does data hiding contribute to security?

A

It prevents unauthorized access to data by positioning it in a compartment not accessible to unauthorized subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is security governance?

A

Practices related to supporting, evaluating, defining, and directing security efforts within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is security governance ideally performed within an organization?

A

Ideally performed by a board of directors but smaller organizations may have the CEO or CISO oversee these activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the importance of external sources in security governance?

A

Provide knowledge and insight against which the organization’s security processes and infrastructure are compared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some factors that impose governance on organizations?

A

Legislative and regulatory compliance needs industry guidelines or license requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of documentation review in governance and third parties?

A

Ensures that exchanged materials meet standards and expectations before on-site inspections reducing the risk of non-compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is third-party governance important?

A

Third-party governance ensures that external entities comply with security objectives requirements regulations and contractual obligations minimizing additional risks to the primary organization.

24
Q

What are the consequences of inadequate documentation in third-party governance?

A

Inadequate documentation can result in the loss or voiding of authorization to operate (ATO) requiring a complete documentation review and on-site inspection for reestablishment.

25
How does risk management relate to documentation review?
Documentation review ensures that business tasks systems and methodologies support security goals through vulnerability reduction and risk mitigation.
26
What does managing the security function entail?
Involves evaluating and improving security over time through proper governance; risk assessment; measurable security; and metrics evaluation.
27
How should security planning align with business strategy?
Aligns with organizational strategy; goals; and objectives. Business cases are used to justify security initiatives; and a top-down approach is preferred for effective security management planning.
28
What needs to be autonomous to avoid internal politicl issues?
The information Security Team for effective security management.
29
Describe the different types of security plans.
Security plans include strategic plans (long-term); tactical plans (mid-term); and operational plans (short-term); each focusing on specific objectives and timelines.
30
What are elements of security planning?
defining security roles; how security will be managed; responsibilities; testing for effectiveness; policies; education.
31
What organizational processes should security governance address?
All aspects of organization including acquisitions; mergers; divestitures; etc.
32
What are the key security roles within an organization?
Senior manager; security professional; asset owner; custodian; user; and auditor.
33
Name some widely recognized security control frameworks.
COBIT; NIST; CIS; ISO/IEC; and ITIL; each providing guidelines and best practices for IT security management.
34
What disproves negilgence in management?
Due diligence and due care
35
What is a Security Policy?
It defines the scope of security needed by an organization outlines strategic objectives and goals assigns responsibilities and specifies compliance requirements and acceptable risk levels.
36
What are the components of security documentation below Security Policies?
Standards Baselines and Guidelines.
37
Define Standards in security documentation.
Compulsory requirements for hardware software technology and security controls within an organization.
38
What is the purpose of Baselines in security documentation?
Establish a minimum level of security that all systems must meet providing a foundational secure state.
39
Explain Guidelines in the context of security documentation.
Offer recommendations on implementing standards and baselines providing flexibility for customization based on unique system conditions.
40
What do Security Procedures entail?
Detailed step-by-step documents describing actions necessary to implement specific security mechanisms controls or solutions.
41
Why is it beneficial to keep security documentation separate?
This allows for tailored access to different users and makes it easier to update and redistribute affected material without overhauling entire policies.
42
What role does security documentation play in an organization?
Guides decisions; training; problem-solving; and future expansion; supporting real-world security in a directed efficient and specific manner.
43
What is threat modeling?
Involves identifying categorizing and analyzing potential threats to a system or product.
44
What are defensive or proactive measures in threat modeling?
Involve threat modeling during design and development.
45
What is reactive or adversarial threat modelling?
Threat modelling after deployment
46
Name three methods for identifying threats.
Focusing on assets; attackers; or software.
47
What is the STRIDE model used for in threat modeling?
The STRIDE model categorizes threats into Spoofing; Tampering; Repudiation; Information Disclosure; Denial of Service; and Elevation of Privilege.
48
Describe the Process for Attack Simulation and Threat Analysis (PASTA).
Risk-centric methodology involving seven stages for threat modeling.
49
What does VAST stand for and what is its purpose?
VAST stands for Visual Agile and Simple Threat and it integrates threat and risk management into Agile programming environments.
50
What is the purpose of creating diagrams in threat modeling?
Visualize potential attack concepts and data flow within a system.
51
What is reduction analysis in threat modeling?
This involves decomposing the application system or environment to understand its internal components and interactions.
52
How are threats prioritized in threat modeling?
Threats are prioritized based on factors such as probability and damage potential.
53
Name a risk assessment technique used in threat modeling.
The DREAD system which assesses Damage Potential; Reproducibility; Exploitability; Affected Users; and Discoverability.
54
What is Supply Chain Risk Management (SCRM)?
Ensures the reliability security and integrity of the supply chain
55
Why is it important to establish minimum security requirements within the supply chain?
Establishing minimum security requirements ensures that each entity within the supply chain meets or exceeds expected security levels
56
What are Service-Level Requirements (SLRs) and how are they used in supply chain management?
They define the expected service and performance levels from vendors often incorporated into Service Level Agreements (SLAs) to ensure security and performance standards are met.