Fundamentals Flashcards

1
Q

Information Security

A

act of protecting the data from bad actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

act of protecting the SYSTEM that holds the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

C.I.A.N.A

A

Confidentiality Integrity Availability Non-repudiation A.A.A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A.A.A

A

Authentication Authorization Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

C.I.A.N.A Confidentiality

A

ensures that information is only accessible to those with proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

C.I.A.N.A Integrity

A

ensures that data remoins unaltered during transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

C.I.A.N.A Availability

A

ensures that information and resources are accessible/functional when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

C.I.A.N.A Non-Repudiation

A

ensures that an action has taken place and cannot be denied by all parties involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A.A.A Authentication

A

process of verifying the identity of an user and/or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A.A.A Authorization

A

defines what actions or resources an user can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A.A.A Accounting

A

act of tracking user activities and resource usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Controls

A

the measures put in place to mitigate risks and protect the C.I.A.N.A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control Plane

A

consists of the identity, scope reductions of threats, policy driven, and secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Plane

A

focused on the system, policy engine, policy admin, and enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threats

A

the ideas/actions that can harm systems; Usaually outside of your control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerabilities

A

the weaknesses you let in by design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PII

A

Personal ID Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PHI

A

Personal Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ways to ensure confidentiality (5 E,D,A,P,T)

A

Encryption, Data Masking, Access Controls, Physical Security Measures, Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Confidentiality =

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Confidentiality Encryption

A

process of converting data to code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Confidentiality Access Controls

A

ensure only authorized personnel can access certain types of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Confidentiality Data Masking

A

obscuring data within a database so that unauthorized users cannot read it

24
Q

Confidentiality Physical Security Measures

A

physical security

25
Confidentiality Training
training the workers
26
Integrity =
Hashing
27
Integrity Hashing
converting data into a fixed sized data → Makes a hash digest
28
Integrity Digitial Signatures
use encryption to ensure integerity
29
Integrity Checksums
verify the integrity of data during transmissions
30
Integrity Regular Audits
reviewing logs and operations to ensure authorized changes have been made
31
Availability =
Redundancy
32
Non-Repudiation =
Digital Signature
33
A.A.A Authentication =
Verifying Identity
34
Authenticatication Factors (5)
Possesion, Location, Inherited, Behavior, Knowledge
35
Authenticatication TFA
Two Factor Authentication
36
Authenticatication MFA
two or more factor authentication
37
Accounting Audit Trail
used to provide a chronological record of user activities
38
Accounting Regulatory Compliance
maintains a comprehensive record of all user’s activities
39
Accounting Forensic Analysis
use detailed accounting and event logs to analyze incidents
40
Accounting Resource Allocation
tracking resource utilization we can optimize the system
41
Accounting User Accountability
informing the user of logging
42
Accounting Syslog Servers
collecting various of logs to analyze patterns and anomalies
43
Accounting Network Analyzers
Capture & analyze the network for solutions
44
Accounting System Information and Event Management (SIEM)
using events and system infrastructure to keep track
45
Technical Controls
technologies, hardware, and software used to manage/reduce risks
46
Managerial Controls (Administration)
the strategic planning/governance of security
47
Operational Controls
the procedures and measures designed to protect data on a day-to-day basis (Backup Procedures, Account Reviews, and Training Programs)
48
Physical Controls
real world preventative measure of a security asset (Shreading Documents, Security Guards, Locking the Doors)
49
Types of Security Controls (Pre, Deter, Dete, Corr, Comp, Direc)
Preventative, Deterrent, Detective, Corrective, Compensating, and Directive
50
Zero Trust seperates the architecture to what planes
Data and Control
51
Zero Trust Adaptive Identity
use adaptive identities that rely on real-time validation that takes into account the user’s behavior, device location, etc…
52
Control Plane Policy Engine
cross reference the access requrest with predefined policies
53
Control Plane Poly Administrator
the person that enforces the policy engine
54
Data Plane Policy Enforcement Point
where the access is either given or denied
55
Gap Analysis
evaluating the differences between an org’s current performance to the target performance
56
Gap Analysis Types:
Technical and Buisness