Fundamentals of Security Flashcards

1
Q

Information Security

A

Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Ensures information is accessible only to authorized personnel (e.g.,
encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Ensures data remains accurate and unaltered (e.g., checksums)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Ensures information and resources are accessible when needed (e.g.,
redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudiation

A

Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIANA Pentagon

A

An extension of the CIA triad with the addition of non-repudiation and
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Triple A’s of Security

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Control Categories

A

■ Technical
■ Managerial
■ Operational
■ Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Control Types

A

■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero Trust Model

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To achieve zero trust, we use what two PLANES?

A

■ Control Plan
■ Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control Plane

A

Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Plane

A

Subject/system, policy engine, policy administrator, and
establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat

A

Anything that could cause harm, loss, damage, or compromise to our information
technology systems

■ Disasters
■ Cyber attacks
■ Security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability

A

Any weakness in the system design or implementation that is INTERNAL

■ Missing security patches
■ Bugs
■ Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Management

A

Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Confidentiality

A

■ Information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3 main reasons why confidentiality is important

A

■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the five basic methods to ensure confidentiality?

A

■ Encryption
■ Access Controls
■ Data Masking
■ Physical Security Measures
■ Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Encryption

A

Process of converting data into a code to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Access Controls

A

By setting up strong user permissions, you ensure that only authorized
personnel can access certain types data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Masking

A

Method that involves obscuring specific data within a database to make it
inaccessible for unauthorized users while retaining the real data’s
authenticity and use for authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Physical Security Measures

A

Ensure confidentiality for both physical types of data, such as paper
records stored in a filing cabinet, and for digital information contained on
servers and workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Training and Awareness
Conduct regular training on the security awareness best practices that employees can use to protect their organization’s sensitive data
26
Integrity
Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
27
What are the three main reasons why Integrity is important?
■ To ensure data accuracy ■ To maintain trust ■ To ensure system operability
28
What are the five methods used to help us maintain the integrity of our data, systems, and networks?
■ Hashing ■ Digital Signatures ■ Checksums ■ Access Controls ■ Regular Audits
29
Hashing
Process of converting data into a fixed-size value
30
Digital Signatures
Ensure both integrity and authenticity
31
Checksums
Method to verify the integrity of data during transmission
32
Access Controls
Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations
33
Regular Audits
involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed
34
Availability
Ensure that information, systems, and resources are accessible and operational when needed by authorized users ■ Continuity ■ Maintaining Customer Trust ■ Upholding an Organization's Reputation
35
What is needing to combat the challenges that come with availability?
Redundancy
36
Redundancy
Duplication of critical components or functions of a system with the intention of enhancing its reliability
37
What are the four types of redundancy?
■ Server ■ Data ■ Network ■ Power
38
Server Redundancy
Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over the load to continue supporting your end users
39
Data Redundancy
Involves storing data in multiple places
40
Network Redundancy
Ensures that if one network path fails, the data can travel through another route
41
Power Redundancy
Involves using backup power sources, like generators and UPS systems
42
Non-repudiation
Security measure that ensures individuals or entities involved in a communication or transaction cannot deny their participation or the authenticity of their actions
43
Digital Signatures
Created by first hashing a particular message or communication that you want to digitally sign, and then it encrypts that hash digest with the user’s private key using asymmetric encryption
44
Authentication
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
45
What are the 5 authentication methods used?
■ Knowledge ■ Possession ■ Inherence ■ Location ■ Action
46
Knowledge Factor
Relies on information that a user can recall
47
Possession Factor
Relies on the user presenting a physical item to authenticate themselves
48
Inherence Factor
Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be
49
Action Factor
Relies on the user conducting a unique action to prove who they are
50
Location Factor
Relies on the user being in a certain geographic location before access is granted
51
Authorization
Pertains to the permissions and privileges granted to users or entities after they have been authenticated
52
Accounting
Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded
53
What are the 4 Broad Categories of Security Controls?
■ Technical ■ Operational ■ Managerial ■ Physical
54
Technical Controls
Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks (Antivirus,firewall)
55
Managerial/Admin Controls
Involve the strategic planning and governance side of security
56
Operational Controls
Procedures and measures that are designed to protect data on a day-to-day basis
57
Physical Controls
Tangible, real-world measures taken to protect assets(cameras, doors, security people)
58
What are the 6 Basic Types of Security Controls?
■ Preventive ■ Deterrent ■ Detective ■ Corrective ■ Compensating ■ Directive
59
Preventive Controls
Proactive measures implemented to thwart potential security threats or breaches
60
Deterrent Controls
Discourage potential attackers by making the effort seem less appealing or more challenging
61
Detective Controls
Monitor and alert organizations to malicious activities as they occur or shortly thereafter
62
Corrective Controls
Mitigate any potential damage and restore our systems to their normal state
63
Compensating Controls
Alternative measures that are implemented when primary security controls are not feasible or effective
64
Directive Controls
● Guide, inform, or mandate actions ● Often rooted in policy or documentation and set the standards for behavior within an organization
65
What are the 2 types of Gap Analysis?
■ Technical Gap Analysis ■ Business Gap Analysis
66
Technical Gap Analysis
● Involves evaluating an organization's current technical infrastructure ● identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions
67
Business Gap Analysis
● Involves evaluating an organization's current business processes ● Identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions
68
Zero Trust
Zero Trust demands verification for every device, user, and transaction within the network, regardless of its origin
69
What are the two different planes to create a zero trust architecture?
■ Control Plane ■ Data Plane