Fundamental of Security Flashcards

Security

1
Q

CIA TRIAD

A

Confidentiality
Integrity
Avaliablity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Non-Repudation

A

Guaranteeing that a specific acation or reven has taken place and cannot be denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA Security

A

Authentication
Authorization
Accounting-Tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zero Trust

A

Should be trusted without correct crendintals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Control Plane

A

Threat scope reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data plane

A

Subject/System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

Protection of info from unauthorized personal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

Turning data into code to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Controls

A

Ensure only authorized personall can access some type’s of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Masking

A

Obscuring data within database. Masking a credit card number besides the last four.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical Security Measures

A

Ensures confidentiality for physical aspect of things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Training and awareness

A

Conducting regular training basically like an all hands to help employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

Helps data reamin accurate unless changed by someone else. Showing who is who.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hashing

A

Process of converting data to a fized value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Signtture

A

Use encryption to ensure integrity and authenticity just like the CAC card or permissons of saying who is changing this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CheckSums

A

Verify the integrity during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access Controls

A

Ensuring that only authorized individuals can mod data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Regular Audits

A

Revewings lows and operations to make sure if anything has changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Availability

A

Making sure services are available when they suppose to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Redundancy

A

Backup options in case systems fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Server Redundancy

A

Using multiple servers in a load balance. If one fails you have other servers to support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Redundancy

A

Storing data in multiple places. Raids or hybrids

23
Q

Network Redundancy

A

Traffic can travel still through another route.

24
Q

Power Redundancy

A

Genertors and etc that provide power.

25
Q

Non-Repuditation/Digital Signatures

A

Undeniable proof of digital transactions.

26
Q

Authentication

A

Ensures individuals who they are. Focus on the Identity in a digital interaction.

27
Q

Authorization/Gate Keeper

A

Permissions and privileges granted to users.
Set of rules and actions.

28
Q

Accounting

A

Ensures all user activities are tracked and recorded.

29
Q

Audit Trail

A

Chronloligcal record of all user activities

30
Q

Regulatory Complance

A

maintains record of all user activity

31
Q

Forensic Analysis

A

Detailed accounting and even logs help cybersec users.

32
Q

Resource Optimization

A

Can optimize systems and minimize cost.S

33
Q

Syslog servers

A

Used to aggregate logs from various network devices

34
Q

Network Analyzers. Ex WireShark

A

Use to capture and analyze network traffic to gain detailed insights on all data moving within a network.

35
Q

Security Control Cateogries:
1.Technical Controls
2.Managerial Controls
3.Operational Controls
4.Physical Controls

A

1.Tech and hardware and software are implemented to manage and reduce risk(Ex. AntiVirus,Firewalls, encryption processes).
2.Strategic planning and governance.(Ex. Admin Stuff, risk assessments, security policies etc)
3. Protect data day to day. Changing your password every 90 days or back up procedires.
4. Real world measures that are not digital.Cameras doors etc.

36
Q

Security Info and even managment

A

Real time analysis of security alerts.

37
Q

Preventative Controls

A

Proactive measures to thwart potential security threats like a firewall.

37
Q

Deterrent Controls

A

Discourage potential attackers makeing the effort more challenging. Like a burglar systems and ads in the house like the ADT grass stamp.(Warning Signs).

37
Q

Detective Contriols

A

Monitor and alerts orgs to malicious activities. Focus on detection and modification.(IDS- Intrusion detection system)

37
Q

Corrective Controls

A

Mitigating any damage and restoring systems. Like an antivirus that quirtines the malwate

37
Q

Compensating Controls

A

Alternative measures when primary security controls are not effective. Using a back up security type vibe.

37
Q

Directive Controls

A

Directive controls are policies or procedures that dictate specific actions or behaviors by users or systems.

38
Q

Control Plane

A

Framework and set of componets responsible for defining managing. What where when etc.

38
Q

Policy-Driven Access Control

A

Developing,managing and enforcing user access into there role.

38
Q

Adaptive Identity

A

Rely on real time validation. Account the user behavior

38
Q

Threat scope reduction

A

Limit userr access to only what they need for work

39
Q

Secured Zones

A

Isolated environments within the network designed to house sensitive data.

40
Q

Policy Engine

A

Cross references the access request like a rule book.

41
Q

Subject/System

A

Refers to the indiviual or entity attempting to gain access.

42
Q

Policy Enforcement point

A

Allow or restrict the access.

43
Q

Gap Analysis

A

Process of evaluating current performance and where they want to be and looking at what needs to be approved.

44
Q

Technical Gap Analysis

A

Evaluating an or current tech infrastructure. Finding gaps they need to make there technical aspect stronger.

45
Q

Business Gap Analysis

A

evaluating an org current business processes. Finding areas where they fall short for cost and etc.

46
Q

Plan of action and Milestones(POA&M)

A

Outlining specific measuers to address each vulnerability allocate resources and set up times likes for task that need to be done.