Domain 1: Security Principles Flashcards

1
Q

What are the three main goals of cybersecurity?

A

Confidentiality: Protects information from unauthorized disclosure.

Integrity: Protects information from unauthorized changes.

Availability: Protects authorized access to system and data.

CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Snooping

A

Involves gathering information that is out in the open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dumpster Diving

A

Looking through trash for information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Eavesdropping

A

Rules about sensitive conversations prevent eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wiretapping

A

Electronic Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social Engineering

A

Attacker uses psychological tricks to persuade employee to give it or give access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False? Education and Training helps combat Social Engineering

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unauthorized Modification

A

Attackers make changes without permission (can be internal=employees or external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Impersonation

A

Attackers pretend to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Man-in-the-Middle (MinM)

A
  • Attackers place themselves in the middle of communication sessions
  • Intercepts network traffic as users log in to their system and assume their role.
  • Impersonation on an electronic/digital level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Replay

A
  • Attackers eavesdrop on logins and reuse the captured credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False? Encryption protects against replay attacks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of Service (DoS)

A
  • When a malicious individual bombards a system with an overwhelming amount of traffic.
  • The idea to is to send so many requests to a server that it is unable to answer any requests from legitimate users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can be used to protect against DoS attacks?

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Power Outages

A

Having redundant power sources and back-up generators protect against power outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware Failures/Destruction

A
  • Failure of servers, hard drives, network gear etc
    • Redundant components protect against hardware failure
    • Building systems that have a built-in redundancy, so that if one component fails, the other will take over
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What to do in the event of a hardware failure?

A

Set up backup data centers. (ex. Cloud)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Service Outages

A

Service outages may occur due to programming errors, failure of underlying equipment, and many more reasons

Building systems that are resilient in the fact of errors and hardware failures protect against service outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identification

A

Identification involves making a claim of identity (Can be false)
Ex. Username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authentication

A

Authentication requires proving a claim of identity
Ex. Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authorization

A
  • Authorization ensures that an action is allowed
    • Electronic authorization commonly takes the form ofaccess control lists
      • Access Control Lists also providesAccounting functionality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Accounting

A
  • Accounting allows to track and maintain logs of user activity
    - Can track systems and web browsing history
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Controls for password requirements

A

Length

Complexity

Expiration (Force password changes)

History (Can’t use a past password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Password Manager

A

Secured password vaults often protected by biometric mechanisms.

Facilitates the use of strong passwords

Stores passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Multi-factor authentication

A

Something you know (Passwords, pins)

Something you are (Biometrics, voice, fingerprints)

Something you have (Software and hardware tokens)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Single Sign-On (SSO)

A
  • Shares authenticated sessions across systems
  • Organizations create SSO solutions within their organizations toavoid users repeatedly authenticating
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Non-repudiation

A

Prevents someone from telling the truth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Methods of non-repudiation

A
  • Physical signatures can provide non-repudiation on contracts, receipts etc
  • Digital signatures use encryption to provide non-repudiation
  • Other methods can be biometric security controls, Video-surveillance etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Organization Privacy Concerns

A
  1. Protecting our own data
    • Protect your down organizations data
  2. Educating on users
    • Educated users of how they can protect their own personal information
  3. Protecting data collected by our organizations
    • Protecting data that was entrusted to the organization (ex= client’s data)
30
Q

Types of Private Information

A
  1. Personally-Identifiable Information (PII)
    • Any information that can be tied back to a specific individual
  2. Protected Health Information (PHI)
    • Health care records
      • Regulated by HIPPA
31
Q

Reasonable Expectation of Privacy

A

Many laws that govern whether information must be protected are based upon whether the person disclosing the information had a reasonable expectation of privacy

Ex. if you upload a YouTube video, you do not have an expectation of privacy

32
Q

True or false. You have a reasonable expectation of privacy when it comes to emails and messages.

33
Q

What is an internal risk and how to handle it?

A

Internal Risk - Risks that come from inside the organization

Solution: Internal control can stop it.

34
Q

What is an external risk and how to handle it?

A

External Risk - Risks that arise outside the organization.

Solution: Build controls that reduce the chances of attacks/risks being successful. (Multi-factor authentication and social engineering awareness campaigns.)

35
Q

What is a multiparty risk and how to handle it?

A

Risks that affect more than one organization.

  • Intellectual property theftposes a risk to knowledge-based organizations
  • If attackers can alter, delete, or steal this information, it would cause significant damage to the organization and its customers/counterparties
  • Software license agreements issue risk fines and legal actions for violation of license agreements
36
Q

Risk Assessment

A

Identifies risks

37
Q

Threat

A

External forces that jeopardize security

38
Q

Threat Vector

A

Methods used by attackers to get to their target (ex= social engineering, hacker toolkit, etc)

39
Q

Vulnerability

A

Weaknesses in the security controls

40
Q

Threat + Vulnerability = ?

41
Q

What is likelihood and impact?

A

Likelihood - Probability that a risk will occur

Impact - Amount of damage a risk will cause.

42
Q

Qualitative Techniques

A

Usessubjective ratingsto evaluate risk likelihood and impact: Usually in the form oflow, medium or highon both the likelihood and impact scales.

43
Q

Quantitative Techniques

A

Uses subjectivenumeric ratingsto evaluate risk likelihood and impact

44
Q

Risk Avoidance

A

Changes business practices to make a risk irrelevant

45
Q

Risk Transference

A
  • Attempting to shift the impact of a risk from your organization to another organization
    • Example : Insurance policy
    • Note that you cannot always transfer the risk completely. Reputation damage etc.
46
Q

Risk Mitigation

A

Actions that reduce the likelihood or impact of a risk

47
Q

Risk Acceptance

A

Choice to continue operations in the face of a risk

48
Q

Risk Profile

A

Combination of risks that an organization faces

49
Q

Inherent Risk

A

Initial level of risk, before any controls are put in place

50
Q

Residual Risk

A

Risk that is reduced and what is left of it is known as the residual risk

51
Q

Control Risk

A
  • New risks that may have been introduced by the controls applied to mitigate risk
    • Example : Controls Applied may be installing a firewall. While that firewall may have mitigated the inherent risk, the risk of that firewall failing is another newly introduced risk
52
Q

Inherent Risk →Controls Applied→ ? + ?

A

(Residual Risk + Control Risk)

53
Q

Risk Tolerance

A

Is the level of risk an organization is willing to accept

54
Q

Security Controls

A

Are procedures and mechanisms that reduce the likelihood or impact of a risk and help identify issues

55
Q

Defense in Depth

A
  • Usesoverlappingsecurity controls
  • Different methods of security with a common objective

Security professionals uses differentcategories to group similar security controls

First group the controls by their purpose. Then group the controls by their mechanism.

56
Q

3 Types of Control Purposes are

A
  1. Prevent
    • Stops a security issue from occurring
  2. Detect
    • Identify security issues requiring investigation
  3. Correct
    • Remediate security issues that have already occurred
57
Q

3 Types of Control Mechanisms are:

A
  1. Technical
    • Use technology to achieve control objectives
    • Examples: Firewalls, Encryption, Data Loss Prevention, Antivirus Software)
    • Technical Control a.k.a Logical Control
  2. Administrative
    • Uses processes to achieve control objectives
    • Examples: User access reviews, log monitoring, performing background checks)
  3. Physical
    • Controls that impact the physical world
    • Examples: Locks, Security guard
58
Q

Baselines

A
  • Provide a configuration snapshot
  • Dual Net
  • You can use the snapshot to assess if the settings are outside of an approved change management process system
  • Basically the default configuration setting set by an organization
59
Q

Versioning/Version Controls

A
  • Assigns each release of a piece of software and an incrementing version number that may be used to identify any given copy
  • These verison #s are written as three part decimals, with the
  • First number representing the major version of software
  • Second number representing a major updates
  • Third number representing minor updates
60
Q

True or False? You must not identify how domestic and internationalLaws and Regulationsapply to an organization

61
Q

Policies

A
  • Provide the foundation for an organization’s information security program
  • Describes organization’s security expectations
  • Policies are set by Senior Management
  • Policies should stand the test of time anticipating future changes
  • Compliance with Policies aremandatory
62
Q

Standards

A
  • Describes the specific details of security controls
  • Compliance with Standards aremandatory
63
Q

Guidelines

A
  • Provide advice to the rest of the organization on best practices
  • Compliance with Guidelines areoptional
64
Q

Procedures

A
  • Step-by-step procedures of an objective.
  • Compliance can bemandatory or optional
65
Q

Acceptable Use Policies (AUP)

A

Described authorized uses of technology

66
Q

Data Handling Policies

A

Describe how to protect sensitive information

67
Q

Password Policies

A
  • Describes password security practices
  • An area where all the password requirements (length, complexity) gets officially documented
68
Q

Bring Your Own Device Policies (BYOD)

A

Cover the usage of personal devices with company information

69
Q

Privacy Policies

A
  • Cover the use of personally identifiable information
  • Can be enforced by National & Local authorities
70
Q

Change Management Policies

A

Cover the documentation, approval, and rollback of technology changes