FUNDAMENTALS OF SECURITY Flashcards

FUNDAMENTALS OF SECURITY

1
Q

What is the difference between Information Security and Information System Security?

A

Information Security: It is the act of protecting the data and information from unauthorized access, unlawful modification and disruption. Information security -> Data that the systems are holding, not the system itself.

Information System Security: It is the act of protecting the systems that hold and process our critical data. It could be a computer, server, network device or even a smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the CIA triad?

A

The CIA triad stands for :
Confidentiality -> It ensures that information is available only to those with the proper authorization.

Integrity -> It ensures the data remains accurate and unaltered unless modification is required.

Availability -> It ensures that information resources are accessible and functional when needed by authorized users.

There are the 3 pillars of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is non repudiation?

A

Non repudiation means guaranteeing that a specific action or event has taken place and can not been denied by the parties involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the AAAs of security?

A

Authentication -> It is the process of verifying the identity of a user or of a system.

Authorization-> It determines what actions or resources an authenticated user has permissions to perform.

Accounting-> It is the act of tracking your user activities and resource utilization. It is usually done for auditing or billing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Security controls?

A

They are measures or mechanisms put in place to mitigate risks and protect the confidentiality , integrity and availability of information systems and their data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the categories of security controls?

A

Technical
Managerial
Operational
Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different types of security controls?

A

Preventive
Deterrent
Detective
Corrective
Compensating
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Zero Trust

A

It is a security model that operates on the principle that no one, whether inside or outside the organization should be trusted by default, hence verification will be required from everybody who’s trying to access to your system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to achieve Zero Trust?

A

We have to use:
A control plane ->Adaptive identity, threat scope reduction, policy driven access control, secured zone.

A Data plane-> It focuses on subject/system, policy engine, policy administrator and establishing policy enforcement points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly