Finals Flashcards
What is Information Security?
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
What are Information Assets
Information assets are valuable data in various forms, including physical and digital
items.
What are Information Assets Examples
Paper documents
digital files
databases
passwords
encryption keys
software
source code
What is the 2 Levels of Security
Balance: Security implementation should balance protection with productivity.
Considerations: Evaluate security level based on asset value and acceptable performance.
What is the CIA Triad
Confidentiality: Protecting data from unauthorized access
Integrity: Preventing unauthorized or undesirable changes to data.
Availability: Ensuring access to data when needed.
What is International Information Security Standard: ISO/IEC 27001
Definition: International standard for information security management systems (ISMS).
Objective: Manage information security by addressing people, processes, and technology.
List the 3 types of Security Controls
Preventive
Detective
Corrective
Definition: Measures to mitigate risk and protect against threats.
What are the 3 types of Security Threats?
Abusers and Misusers: Unauthorized use or misuse of privileges.
- Accidental Occurrences: Employee actions causing damage or data loss.
- Natural Physical Forces: Environmental threats like earthquakes, floods, and fire.
What is the Parkerian Hexad
Confidentiality
Possession: Physical control of data medium
Integrity
Authenticity: Proper attribution of data ownership.
Availability
Utility: How useful the data is to the owner.
Organizations must adhere to industry-specific regulations such as these 3:
PCI-DSS
HIPAA
FERPA
What is Social Engineering
Social engineering involves manipulating individuals to divulge confidential information, often
targeting passwords, and bank details, or attempting to install malicious software.
How to prevent Social Engineering
Awareness Training:
Regularly educate users about social engineering tactics and how to recognize and resist
such attempts.
Acceptable Use Threshold:
Define clear boundaries for the use of personal equipment, typically restricted to the
organization’s guest network rather than the production network.
Security Measures:
Communicate the importance of maintaining security when using personal devices, including
adherence to organizational policies.
Clean Desk Policy:
Emphasize the importance of not leaving sensitive information on desks when unattended for
extended periods.
Data Handling in All Forms:
Reinforce the message that data security extends beyond electronic files and should be
considered for physical documents as well.
Recurring Training:
Regular, ongoing training sessions to reinforce security principles and keep users informed
about evolving threats.
User Accountability:
Encourage a sense of accountability among users for safeguarding information and following
security protocols.
What is
Identification
Authentication
Authorization
Verification
in Information Security
Identification: a means of proving a person’s identity, especially in the form of official papers.
Authentication: Authentication is the process of verifying a claim of identity as true.
Authorization: The process of giving someone the ability to access a resource
Verification: Confirming the identity claim.
List the 5 Authentication Factors: (something…)
- Something You Know:
Definition: Uses information that a person can remember.
Examples:
- Passwords
- PINs
- Passphrases
- Strength: Relatively common but can be weak if exposed. - Something You Are:
Definition: Relies on unique physical attributes, often referred to as biometrics.
Examples:
- Fingerprints
- Iris
- Retina patterns
- Facial Characteristics
- Strength: Stronger due to the uniqueness of physical attributes. - Something You Have:
Definition: Based on physical possession of an item or device.
- Examples:
-Key
- Cards
- Phones
- Strength: Physical possession provides a level of security. - Something You Do:
Definition: Based on the actions or behaviors of an individual.
- Examples:
- Individual’s manner of walking.
- Individual’s handwriting
-Signature
- Delay between keystrokes when typing a phrase
- Strength: Offers strong authentication but may lead to false negatives. - Where You Are Located:
Definition: A geographically based authentication factor.
Method: Authentication depends on the person being physically present at specific locations.
Example: Servers accessible only from the server room.
Strength: Difficult to counter without subverting the authentication system or gaining physical
access.
List the 10 Network Security Devices and Tools
- Access Control:
Definition: Regulates who or what can view or use resources in a computer system.
Tools: Firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS),
Identity and Access Management (IAM) systems. - Antivirus and Anti-Malware Software:
Definition: Detects and removes malicious software, preventing it from compromising
systems.
Tools: ESET, BitDefender, Windows Defender. - Application Security:
Definition: Focuses on securing software applications from threats during development and
runtime.
Tools: Static Application Security Testing (SAST), Dynamic Application Security Testing
(DAST), Web Application Firewalls (WAF). - Data Loss Prevention (DLP):
Definition: Monitors, detects, and prevents unauthorized data exfiltration. (Data Theft)
Tools: Symantec Data Loss Prevention, McAfee Total Protection for Data Loss Prevention,
Digital Guardian. - Distributed Denial of Service (DDoS) Prevention:
Definition: Mitigates DDoS attacks by protecting against overwhelming traffic.
Tools: Cloudflare, Akamai, Arbor Networks. - Email Security:
Definition: Protects against email-borne threats, including phishing and malware.
Tools: Cisco Email Security, Proofpoint, Microsoft 365 Defender. - Firewalls:
Definition: Controls and monitors incoming and outgoing network traffic based on
predetermined security rules.
Tools: Cisco ASA, Palo Alto Networks, Check Point, pfSense (open-source firewall). - Mobile Device Security:
Definition: Secures mobile devices and the data they contain from various threats.
Tools: Mobile Device Management (MDM) solutions, Mobile Threat Defense (MTD)
solutions. - Web Security:
Definition: Protects against web-based threats, including malicious websites and attacks
targeting web applications.
Tools: Secure Web Gateways (SWG), Web Application Firewalls (WAF), Cisco Umbrella. - Virtual Private Networks (VPNs):
Definition: Provides secure and encrypted communication over a public network.
Tools: OpenVPN, Cisco AnyConnect, NordVPN, ExpressVPN.