Domain 1 Flashcards

1
Q

What are the three main components of the CIA Triad?

A

Confidentiality Integrity Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does confidentiality aim to prevent?

A

Unauthorized access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can confidentiality be ensured?

A

Through measures like encryption access control and data classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the focus of integrity in the CIA Triad?

A

Maintaining the reliability and correctness of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples of integrity violations?

A

Unauthorized alterations errors in coding and malicious modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the goal of availability?

A

To ensure authorized access to objects without interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What threats does availability protect against?

A

Denial-of-service attacks device failures and environmental issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the DAD Triad and how does it relate to the CIA Triad?

A

The DAD Triad represents Disclosure Alteration and Destruction highlighting security failures opposite to the goals of the CIA Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the risk associated with overprotection?

A

Excessive security measures can lead to constraints on availability or other security aspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does authenticity ensure?

A

Data originates from its claimed source verifying its integrity and preventing unauthorized alterations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of nonrepudiation in security?

A

To prevent denial of actions or events and hold subjects accountable for their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the elements of AAA services in security?

A

Identification Authentication Authorization and Accounting Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does encryption achieve in security?

A

Hiding the meaning or intent of communication from unintended recipients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are security boundaries and why are they important?

A

Lines between areas with different security requirements crucial for controlling the flow of information and deploying appropriate security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the key principle behind defense in depth?

A

Using multiple security controls in a series to protect against various threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is abstraction in security?

A

Grouping similar elements and assigning security controls collectively for efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does data hiding contribute to security?

A

It prevents unauthorized access to data by positioning it in a compartment not accessible to unauthorized subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is security governance?

A

Practices related to supporting, evaluating, defining, and directing security efforts within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is security governance ideally performed within an organization?

A

Ideally performed by a board of directors but smaller organizations may have the CEO or CISO oversee these activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the importance of external sources in security governance?

A

Provide knowledge and insight against which the organization’s security processes and infrastructure are compared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some factors that impose governance on organizations?

A

Legislative and regulatory compliance needs industry guidelines or license requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of documentation review in governance and third parties?

A

Ensures that exchanged materials meet standards and expectations before on-site inspections reducing the risk of non-compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is third-party governance important?

A

Third-party governance ensures that external entities comply with security objectives requirements regulations and contractual obligations minimizing additional risks to the primary organization.

24
Q

What are the consequences of inadequate documentation in third-party governance?

A

Inadequate documentation can result in the loss or voiding of authorization to operate (ATO) requiring a complete documentation review and on-site inspection for reestablishment.

25
Q

How does risk management relate to documentation review?

A

Documentation review ensures that business tasks systems and methodologies support security goals through vulnerability reduction and risk mitigation.

26
Q

What does managing the security function entail?

A

Involves evaluating and improving security over time through proper governance; risk assessment; measurable security; and metrics evaluation.

27
Q

How should security planning align with business strategy?

A

Aligns with organizational strategy; goals; and objectives. Business cases are used to justify security initiatives; and a top-down approach is preferred for effective security management planning.

28
Q

What needs to be autonomous to avoid internal politicl issues?

A

The information Security Team for effective security management.

29
Q

Describe the different types of security plans.

A

Security plans include strategic plans (long-term); tactical plans (mid-term); and operational plans (short-term); each focusing on specific objectives and timelines.

30
Q

What are elements of security planning?

A

defining security roles; how security will be managed; responsibilities; testing for effectiveness; policies; education.

31
Q

What organizational processes should security governance address?

A

All aspects of organization including acquisitions; mergers; divestitures; etc.

32
Q

What are the key security roles within an organization?

A

Senior manager; security professional; asset owner; custodian; user; and auditor.

33
Q

Name some widely recognized security control frameworks.

A

COBIT; NIST; CIS; ISO/IEC; and ITIL; each providing guidelines and best practices for IT security management.

34
Q

What disproves negilgence in management?

A

Due diligence and due care

35
Q

What is a Security Policy?

A

It defines the scope of security needed by an organization outlines strategic objectives and goals assigns responsibilities and specifies compliance requirements and acceptable risk levels.

36
Q

What are the components of security documentation below Security Policies?

A

Standards Baselines and Guidelines.

37
Q

Define Standards in security documentation.

A

Compulsory requirements for hardware software technology and security controls within an organization.

38
Q

What is the purpose of Baselines in security documentation?

A

Establish a minimum level of security that all systems must meet providing a foundational secure state.

39
Q

Explain Guidelines in the context of security documentation.

A

Offer recommendations on implementing standards and baselines providing flexibility for customization based on unique system conditions.

40
Q

What do Security Procedures entail?

A

Detailed step-by-step documents describing actions necessary to implement specific security mechanisms controls or solutions.

41
Q

Why is it beneficial to keep security documentation separate?

A

This allows for tailored access to different users and makes it easier to update and redistribute affected material without overhauling entire policies.

42
Q

What role does security documentation play in an organization?

A

Guides decisions; training; problem-solving; and future expansion; supporting real-world security in a directed efficient and specific manner.

43
Q

What is threat modeling?

A

Involves identifying categorizing and analyzing potential threats to a system or product.

44
Q

What are defensive or proactive measures in threat modeling?

A

Involve threat modeling during design and development.

45
Q

What is reactive or adversarial threat modelling?

A

Threat modelling after deployment

46
Q

Name three methods for identifying threats.

A

Focusing on assets; attackers; or software.

47
Q

What is the STRIDE model used for in threat modeling?

A

The STRIDE model categorizes threats into Spoofing; Tampering; Repudiation; Information Disclosure; Denial of Service; and Elevation of Privilege.

48
Q

Describe the Process for Attack Simulation and Threat Analysis (PASTA).

A

Risk-centric methodology involving seven stages for threat modeling.

49
Q

What does VAST stand for and what is its purpose?

A

VAST stands for Visual Agile and Simple Threat and it integrates threat and risk management into Agile programming environments.

50
Q

What is the purpose of creating diagrams in threat modeling?

A

Visualize potential attack concepts and data flow within a system.

51
Q

What is reduction analysis in threat modeling?

A

This involves decomposing the application system or environment to understand its internal components and interactions.

52
Q

How are threats prioritized in threat modeling?

A

Threats are prioritized based on factors such as probability and damage potential.

53
Q

Name a risk assessment technique used in threat modeling.

A

The DREAD system which assesses Damage Potential; Reproducibility; Exploitability; Affected Users; and Discoverability.

54
Q

What is Supply Chain Risk Management (SCRM)?

A

Ensures the reliability security and integrity of the supply chain

55
Q

Why is it important to establish minimum security requirements within the supply chain?

A

Establishing minimum security requirements ensures that each entity within the supply chain meets or exceeds expected security levels

56
Q

What are Service-Level Requirements (SLRs) and how are they used in supply chain management?

A

They define the expected service and performance levels from vendors often incorporated into Service Level Agreements (SLAs) to ensure security and performance standards are met.