Domain 1: Study Essentials Flashcards
What does confidentiality seek to prevent?
Confidentiality seeks to prevent the unauthorized disclosure of information: it keeps data secret
What is the goal of integrity?
Integrity seeks to prevent unauthorized modification of information and ensure that data written in an authorized manner is complete and accurate
What does availability ensure?
Availability ensures that information is available when needed
What is an active entity in an information system called?
Subject
What is a passive data file referred to as?
Object
What does Annualized Loss Expectancy represent?
The cost of loss due to a risk over a year
What is a threat?
A potentially negative occurrence
What is a vulnerability?
A weakness in a system
What defines risk?
A matched threat and vulnerability
What is a safeguard?
A measure taken to reduce risk
What does Total Cost of Ownership refer to?
The cost of a safeguard
What is Return on Investment?
Money saved by deploying a safeguard
What are the elements of the CIA Triad?
The elements are confidentiality, integrity, and availability.
What does confidentiality mean?
Confidentiality is the principle that objects are not disclosed to unauthorized subjects.
What does integrity mean?
Integrity is the principle that objects retain their veracity and are intentionally modified only by authorized subjects.
What does availability mean?
Availability is the principle that authorized subjects are granted timely and uninterrupted access to objects.
What are the elements of AAA services?
AAA services focus on identification, authentication, authorization, auditing, and accounting.
How does identification work?
Identification is when a subject professes an identity and accounting is initiated.
What is authentication?
Authentication is the process of verifying or testing that a claimed identity is valid.
What is the role of authorization in security?
Authorization ensures that the requested activity or object access is possible given the rights and privileges assigned to the authenticated identity.
What is the auditing process?
Auditing is the programmatic means by which subjects are held accountable for their actions while authenticated on a system.
Why is accounting important in security?
Effective accounting relies on the capability to prove a subject’s identity and track their activities.
What is abstraction in security?
Abstraction is used to collect similar elements into groups, classes, or roles that are assigned security controls, restrictions, or permissions.
What are security boundaries?
A security boundary is the line of intersection between any two areas, subnets, or environments that have different security requirements.
What is security governance?
Security governance is the collection of practices related to supporting, defining, and directing the security efforts of an organization.
What is third-party governance?
Third-party governance is the system of external entity oversight that may be mandated by law, regulation, or contractual obligation.
What is documentation review?
Documentation review is the process of reading the exchanged materials and verifying them against standards and expectations.
How does security function align with business strategy?
Security management planning aligns the security functions to the strategy, goals, mission, and objectives of the organization.
What is a business case?
A business case is usually a documented argument to define a need to make a decision or take some form of action.
What is security management planning?
Security management is based on strategic, tactical, and operational plans.
What are the elements of a formalized security policy structure?
The elements include security policy, standards, baselines, guidelines, and procedures.
What are key security roles?
The primary security roles are senior manager, security professional, asset owner, custodian, user, and auditor.
What is due diligence?
Due diligence is establishing a plan, policy, and process to protect the interests of an organization.
What is due care?
Due care is practicing the individual activities that maintain the due diligence effort.
What is threat modeling?
Threat modeling is the security process where potential threats are identified, categorized, and analyzed.
What are the concepts of supply chain risk management (SCRM)?
SCRM is a means to ensure that all the vendors or links in the supply chain are reliable, trustworthy, reputable organizations that disclose their practices and security requirements to their business partners.
What is a computer-assisted crime?
A computer-assisted crime occurs when a computer is used as a tool to help commit a crime.
How can criminals steal confidential organizational data?
Criminals can steal confidential organizational data in many different ways, and this can occur without a computer.
What is a computer-targeted crime?
A computer-targeted crime occurs when a computer is the victim of an attack that’s sole purpose is to harm the computer and its owner.
What are examples of computer-targeted crimes?
Examples include denial-of-service (DoS) and buffer overflow attacks.
What is an incidental computer crime?
An incidental computer crime occurs when a computer is involved in a computer crime without being the victim of the attack or the attacker.
What is an example of an incidental computer crime?
A computer being used as a zombie in a botnet is part of an incidental computer crime.
What is a computer prevalence crime?
A computer prevalence crime occurs due to the fact that computers are so widely used in today’s world.
What is an example of a computer prevalence crime?
Software piracy is an example of this type of crime.
What is the difference between hackers and crackers?
Hackers attempt to break into secure systems to obtain knowledge, while crackers do so without using the knowledge for nefarious purposes.
What is Civil Law?
Civil law, also known as civil code law, is based on written laws and does not rely on precedence. It is the most common legal system in the world.
What is Common Law?
Common law, developed in England, is based on customs and precedent. It requires lower courts to follow higher court decisions.
What are the three systems of Common Law?
Common law is divided into criminal law, civil/tort law, and administrative/regulatory law.
What does Criminal Law cover?
Criminal law covers actions harmful to others and requires proof of guilt beyond a reasonable doubt.
Who prosecutes in Criminal Law?
The plaintiff is usually the state or federal government.
What are the consequences in Criminal Law?
Guilty parties may be imprisoned and/or fined.
What does Civil/Tort Law deal with?
Civil/tort law addresses wrongs committed against individuals or organizations.
What must a plaintiff prove in Civil/Tort Law?
The plaintiff must prove that the defendant had a duty of care, breached that duty, and caused harm.
What types of damages can a victim seek in Civil Law?
Victims can seek compensatory, punitive, and statutory damages.
What is Administrative/Regulatory Law?
Administrative law sets performance standards by government agencies for organizations and industries.
What sectors are covered by Administrative/Regulatory Law?
Common sectors include public utilities, communications, banking, and healthcare.
What is Customary Law?
Customary law is based on the customs of a country or region and is often incorporated into mixed legal systems.
What is Religious Law?
Religious law is based on religious beliefs and varies by culture and country.
What is Mixed Law?
Mixed law combines two or more types of law, often civil law and common law.
What is a Patent?
A patent grants exclusive rights to an invention for a period of time, usually 20 years.
What is a Trade Secret?
A trade secret protects proprietary information and can be kept indefinitely if confidentiality is maintained.
What is a Trademark?
A trademark protects symbols, sounds, or expressions that identify a product or organization.
How long is a Trademark valid?
A trademark is valid for 10 years and must be renewed.
What is Copyright?
Copyright protects authored works from reproduction without consent and lasts for the life of the author plus 70 years.
What is Freeware?
Freeware is software available free of charge, including rights to copy, distribute, and modify.
What is Shareware?
Shareware is software shared for a limited time that requires purchase after a trial period.
What is Commercial Software?
Commercial software is licensed for purchase in a wholesale or retail market.
What is Software Piracy?
Software piracy is the unauthorized reproduction or distribution of copyrighted software.
What is Digital Rights Management (DRM)?
DRM controls the use of digital content and involves device controls.
What does the U.S. DMCA of 1998 impose?
The DMCA imposes criminal penalties on those who circumvent content protection technologies.
What are the steps of NIST risk management framework
The NIST risk management framework includes the following steps:
- Categorize information systems.
- Select security controls.
- Implement security controls.
- Assess security controls.
- Authorize information systems.
- Monitor security controls.
What is eDiscovery?
Electronic discovery (eDiscovery) refers to civil litigation or government investigations that deal with the exchange of information in electronic format as part of the discovery process.