Foundations of cybersecurity_C1 Flashcards

1
Q

What are the benefits of organisational security teams?

A
  1. Threat protection- Protects against external and internal threats.
  2. Compliance Regulation- org meets security standards required by laws and guidelines.
  3. Productivity- Maintain and improve business productivity.
  4. Expense Reduction- during data loss recovery, operation downtime and prevent fines.
  5. Brand Trust- data compromises lower trust and impact business.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CISSP stand for?

A

Certified Information Systems Security Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 8 Eight CISSP Security Domains?

A
  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communications and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a security domain covered in the CISSP?
a) Security and risk management
b) Asset security
c) Software development security
d) Cloud security

A

d) Cloud security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of least privilege?
a) Granting users the highest level of access possible
b) Granting users only the minimum level of access necessary to perform their tasks
c) Allowing users to access any data they want d) Restricting users from accessing any data

A

b) Granting users only the minimum level of access necessary to perform their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ‘Security Posture’?

A

An organisation’s ability to manage it’s defence of critical assets and data, and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Risk Mitigation?

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Business Continuity

A

An organisation’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CISSP Domain 1
Security and Risk Management involves:

A

-Defines security goals and objectives: reduce risks to critical assets and data like PII

-Mitigates risks processes: right procedures/rules in place to quickly reduce the impact of a risk. i.e. a breach

-Ensures compliance: used to develop an organization’s internal security policies, regulatory requirements, and independent standards.

-Establishes business continuity:
organization’s ability to maintain everyday productivity by establishing risk disaster recovery plans.

-Adheres to legal regulations: Different worldwide laws, but overall goals are similar (related to security and risk management).

-Professional and organisational ethics:
This means following rules and expectations for ethical behaviour to minimize negligence, abuse, or fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information security, or InfoSec

A

related CISSP domain 1 and refers to a set of processes established to secure information.

An organization may use playbooks and implement training as a part of their security and risk management program, based on their needs and perceived risk.
There are many InfoSec design processes, i.e:
Incident response
Vulnerability management
Application security
Cloud security
Infrastructure security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CISSP Domain 2:
Asset Security involves:

A

managing the cybersecurity processes of organizational assets

-Secures digital and physical assets:
-Stores, maintains, retains, and destroys physical and virtual data securely
-Protects PII and SPII
-Ensures data is securely handled and protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CISSP Domain 3:
Security Architecture and Engineering involves:

A

managing date security-Security Architects and engineers create processes

Optimizes data security
Implements effective tools, systems, and processes
Promotes shared responsibility:
Encourages user involvement in security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by ‘Shared responsibility’ ?

A

all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.
By having policies that encourage users to recognize and report security concerns, many issues can be handled quickly and effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the Security Architecture and Engineering design principles:

A

Threat modeling
Least privilege
Defense in depth
Fail securely
Separation of duties
Keep it simple
Zero trust
Trust but verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CISSP Domain 4
Communication and Network Security involves:

A

-Manages and secures physical networks and wireless communications.
-Protects data and communications on-site, in the cloud, and remotely
-Prevents vulnerabilities from insecure connections
-Discourages insecure behaviour that could be exploited by threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CISSP Domain 5
Identity and Access Management (IAM) involves

A

Keeping data secure
by controlling access to physical and logical assets
Components of IAM:
* Identification
* Authentication
* Authorisation
* Accountability

17
Q

What is meant by Identification in (IAM)?

A

user verifies who they are by providing a user name, an access card, or biometric data such as a fingerprint

18
Q

What is meant by Authentication in (IAM)?

A

verification process to prove a person’s identity, such as entering a password or PIN.

19
Q

What is meant by Authorisation in (IAM)?

A

Once user’s identity has been confirmed and relates to their level of access, which depends on the role in the organization

20
Q

What is meant by Accountability in (IAM)?

A

monitoring and recording user actions, like login attempts, to prove systems and data are used properly.

21
Q

CISSP Domain 6
Security Assessment and Testing involves

A

identifying and mitigating risks, threats, and vulnerabilities
* Conducting security control testing:
Assists an organization in identifying new and better ways to mitigate threats, risks, and vulnerabilities.
Involves examining organizational goals and objectives, and evaluating if the controls being used actually achieve those goals

*Data collection and analysis:
Conducted regularly also helps prevent threats and risks to the organization.

*Conducting audits to monitor for risks, threats, and vulnerabilities.
To reduce the probability of a data breach.
Security analysts may conduct regular audits of auditing user permissions to validate that users have the correct levels of access to internal systems.

22
Q

CISSP Domain 7
Security Operations involves:

A

Conducting investigations
Implementing preventative measures

23
Q

CISSP Domain 8
Software Development Security involves

A

Using secure coding practices and guidelines to create secure applications and services.
Software development lifecycle
Performing application security tests

24
Q

What is a Software Development Lifecycle?

A

an efficient process used by teams to quickly build software products and features.

In this process, security is an additional step. By ensuring that each phase of the software development lifecycle undergoes security reviews, security can be fully integrated into the software product.

A security analyst may work with software development teams to ensure security practices are incorporated into the software development life-cycle.
performing a secure design review during the design phase
secure code reviews during the development and testing phases
penetration testing during the deployment and implementation phase

25
Q

Which of the following is a tool used for monitoring security events?
a) SIEM
b) IDS-Intrusion detection system (IDS)
c) IPS - Intrusion Prevention system (IPS)
d) All of the above

A

d) All of the above

26
Q

What is an IDS?

A

-Intrusion detection system (IDS)
An intrusion detection system or IDS is a monitoring device or software. It detects vulnerabilities, policy violations, and malicious activity in a system. An expanded IDS blocks threats in addition to identifying them.

27
Q

What is an IPS?

A
  • Intrusion Prevention system (IPS)
    An application that monitors system activity for intrusive activity and takes action to stop the activity
28
Q

Why do Security teams use CISSP Security Domains?

A

to organize daily tasks and identify gaps in security that could cause negative consequences for an organization, and to establish the organisation’s security posture.