Domain 1 Security Principles Flashcards

1
Q
  1. Confidentiality
A

Confidentiality means
permitting authorized access to information while at the same time protecting it from improper disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Integrity
A

Integrity is the property of information whereby it is
recorded, used, and maintained in a way that ensures its completeness, accuracy, internal consistency, and usefulness for a
stated purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Availability
A

Availability means that systems and data are accessible at the time users need them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. GDPR
A

These laws, including national- and state-
level laws, dictate that any entity anywhere
in the world handling the private data of
people in a particular legal jurisdiction
must abide by its privacy requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privacy

A

Privacy is the right of an
individual to control the
distribution of information
about themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. How do companies that offer identity theft insurance manage their own financial risk?
A

By calculating premium payments against potential payouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What term is used to refer to information that, when combined with other pieces of data, significantly narrows the possibility of association with more individuals?
A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. In the United States, which act governs the privacy of medical information?
A

Health Insurance Portability and Accountability Act (HIPPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Asset
A

is something in need of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Vulnerability
A

is a gap or weakness in those protection efforts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Threat
A

is something or someone that aims to exploit a vulnerability to thwart protection efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Who is responsible for determining risk tolerance in an organization?
A

Executive management and board of directors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Vulnerability
A

Is a gap or weakness in an organization’s protection of its valuable assets including information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Threat
A

Is someone or something that aims to exploit a vulnerability to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What role might security professionals play in risk assessment at a system level?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Who is responsible for identifying risks within an organization?
A

Employees at all levels of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Security Controls
A

Security controls pertain to the physical, technical, and administrative mechanisms
that act as safeguards or countermeasures to protect the confidentiality, integrity, and availability of the system and its information.

16
Q
  1. Physical Controls
A

Physical controls address security needs using physical hardware devices, such as badge readers, architectural features of
buildings and facilities, and specific security actions taken by staff

17
Q
  1. Technical Controls
A

Technical controls (also called logical controls) are security controls that
computer systems and networks directly implement.

18
Q
  1. Administrative Controls
A

Administrative controls (also known as managerial controls) are directives,
guidelines, or advisories aimed at the people within the organization. They
provide frameworks, constraints, and
standards for human behavior and should cover the entire scope of the
organization’s activities and its interactions with external parties and stakeholders.

19
Q
  1. What is an example of a physical control?
A

Walls, fences, guards, locks

20
Q
  1. According to the code of ethics, what are information security professionals expected to uphold?
A

Be honorable, honest, just and responsible within legal conduct

21
Q
  1. Authentication
A

Authentication is a process to prove the identity of the requestor.

22
24. There are three common methods of authentication
●Something you know: Passwords or passphrases ● Something you have: Tokens, memory cards, smart cards ● Something you are: Biometrics, measurable characteristic
23
25. Which of the following are considered a widely accepted factor for authentication?
Something you know Something you are Something you have
24
26. ISC2 Code of Ethics Canon
● Protect society, the common good, necessary public trust and confidence, and the infrastructure. ● Act honorably, honestly, justly, responsibly, and legally. ● Provide diligent and competent service to principles. ● Advance and protect the profession.
25
27. Procedures
Are the detailed steps to complete a task that support departmental or organizational policies.
26
28. Policies
Are put in place by organizational governance, such as executive management, to provide guidance in all activities to ensure that the organization supports industry standards and regulations.
27
29. Standards
Are often used by governance teams to provide a framework to introduce policies and procedures in support of regulations.
28
30. Regulations
Are commonly issued in the form of laws, usually from government (not to be confused with governance) and typically carry financial penalties for non-compliance.
29
31. HIPPA
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is an example of a law that governs the use of protected health information (PHI) in the United States. Violation of HIPAA carries the possibility of fines and/or imprisonment for both individuals and companies.
30
32. GDPR
The General Data Protection Regulation (GDPR) was enacted by the European Union (EU) to control use of Personally Identifiable Information (PII) of its citizens and those in the EU. It includes provisions that apply financial penalties to companies who handle data of EU citizens and those living in the EU even if the company does not have a physical presence in the EU, giving this regulation an international reach.
31
34. Standards
Standards cover a broad range of issues and ideas and may provide assurance that an organization is operating with policies and procedures that support regulations and widely accepted best practice
32
34. NIST
Is a United States government agency under the Department of Commerce and publishes a variety of technical standards in addition to information technology and information security standard.
33
35. IETF
Thanks to the Internet Engineering Task Force (IETF), there are standards in communication protocols that ensure all computers can connect with each other across borders, even when the operators do not speak the same language.
34
36. IEEE
The Institute of Electrical and Electronics Engineers (IEEE) also sets standards for telecommunications, computer engineering, and similar discipline.
35
38. ISO
The International Organization for Standardization (ISO) develops and publishes international standards on a variety of technical subjects, including information systems and information security, as well as encryption standards. ISO solicits input from the international community of experts to provide input on its standards prior to publishing. Documents outlining ISO standards may be purchased online.
36
38. Policies
Policy is informed by applicable law(s) and specifies which standards and guidelines the organization will follow. Policy is broad but not detailed; it establishes context and sets out strategic direction and priorities. Governance policies are used to moderate and control decision- making, to ensure compliance when necessary, and to guide the creation and implementation of other policies. Policies are often written at many levels across the organization. High- level governance policies are used by senior executives to shape and control decision-making process.
37
39. Policies (continued)
Other high-level policies direct the behavior and activity of the entire organization as it moves toward goals and objectives. Functional areas such as human resources management, finance and accounting, and security and asset protection usually have their own sets of policies. Whether imposed by laws and regulations or by contracts, the need for compliance might also require the development of specific high-level policies that are documented and assessed for their effective use by the organization. Policies are implemented, or carried out, by people; for that, someone must expand the policies from statements of intent and direction into step-by- step instructions, or procedures.
38
40. Procedures
Procedures define the explicit, repeatable activities necessary to accomplish a specific task or set of tasks. They provide supporting data, decision criteria, or other explicit knowledge needed to perform each task. Procedures can address one-time or infrequent actions or common, regular occurrences.
39
41. Procedures (continued)
In addition, procedures establish the measurement criteria and methods to use to determine whether a task has been successfully completed. Properly documenting procedures and training personnel on how to locate and follow them is necessary for deriving the maximum organizational benefits from procedure.
40