ENUMERATION Flashcards

PRELIM

1
Q

PHASES IN THE SECURITY SYSTEMS DEVELOPMENT LIFE CYCLE

A

Initiation Phase
System Concept Development Phase
Design Phase
Development Phase
Implementation Phase
Operations and Maintenance Phase
Disposition Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

THREATS THAT CAN COMPROMISE INFORMATION SECURITY

A

Cyberattacks
Data breaches
Physical security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COMMON TYPES OF ATTACKS

A

Cyberattacks (hacking, malware, data breaches)
Insider Threats
Phishing
Ddos Attacks
Ransomware
Sql injection
Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EXAMPLES OF SECURITY CONTROLS

A

Administrative controls (Security Policies and Procedures)
Physical Controls (Access Control)
Technical Controls (encryption, firewall, intrusion detection systems, access control protocols)
Incident Report Controls (Incident Report Plans)
Compliance Controls (regulatory Compliance Measures, GDPR, HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

THE IMPORTANCE OF INFORMATION

A

Information is valuable therefore, Information Systems are valuable, and compromising Information Security Services (C-I-A) have real consequences (loss).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

THE CIA TRIAD

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly