Fundamentals of Security Flashcards

Objectives 1.1 and 1.2

1
Q

Define / Explain

Information Security

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define / Explain

Information Systems Security

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define / Explain

Confidentiality

CIA Triad

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Ensures information is acessible only to authorized personnel (e.g., encryption)

CIA Triad - Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define / Explain

Integrity

CIA Triad

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Ensures data remains accurate and unaltered (e.g., checksums)

CIA Triad - Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define / Explain

Availability

CIA Triad

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Ensures information and resources are accessible when needed (e.g., redundancy measures)

CIA Triad - Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define / Explain

CIANA Pentagon

CIA Triad + NA = CIANA Pentagon

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

An extension of the CIA triad with the addition of non-repudiation and authentication

CIANA Pentagon = Non-repudiation + Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define / Explain

Non-Repudiation

CIA Triad + NA = CIANA Pentagon

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)

CIANA Pentagon - Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define / Explain

Authentication

AAA / Triple A’s of Security & CIANA Pentagon

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Verifying the identity of a user or system (e.g., password checks)

AAA / Triple A’s of Security & CIANA Pentagon - Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define / Explain

Authorization

AAA / Triple A’s of Security

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Determining actions or resources an authenticated user can access (e.g., permissions)

AAA / Triple A’s of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define / Explain

Accounting

AAA / Triple A’s of Security

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Tracking user activities and resource usage for audit or billing purposes

AAA / Triple A’s of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the following

Security Control Categories

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A
  • Technical
  • Managerial
  • Operational
  • Physical

Security Control Categories (4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the following

Security Control Types

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A
  • Preventative
  • Deterrent
  • Detective
  • Corrective
  • Compensating
  • Directive

Security Control Types (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define / Explain

Zero Trust Model

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Informational

Zero Trust Model

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

To achieve zero trust, we use the control plane and the data plane

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define / Explain

Control Plane

Zero Trust Model

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Adaptive identity, threat scope reduction, policy-driven access control, and secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define / Explain

Data Plane

Zero Trust Model

Obj. 1.0 - General Security Concepts | Fundamentals of Security

A

Subject/system, policy engine, policy administrator, and establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define / Explain

Threat

Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Informational

Threats can come from the following…

Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities

A
  • Natural disasters
  • Cyber-attacks
  • Data integrity breaches
  • Disclosure of confidential information

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define / Explain

Vulnerability

Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities

A

Any weakness in the system design or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Informational

Vulnerabilities can come from internal factors like the following…

Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities

A
  • Software bugs
  • Misconfigured software
  • Improperly protected network devices
  • Missing security patches
  • Lack of physical security

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Informational

Where threats and vulnerabilities intersect, that is where the risk to your enterprise systems and networks lies

Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities

A
  • If you have a threat, but there is no matching vulnerability to it, t hen you have no risk
  • The same holds true that if you have a vulnerability but there’s no threat against it, there would be no risk

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define / Explain

Risk Management

Obj. 1.0 - General Security Concepts | Threats & Vulnerabilities

A

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Informational

Confidentiality…

Obj. 1.2 - Summarize fundamental security concepts | Confidentiality

A
  • Refers to the protection of information from unauthorized access and disclosure
  • Ensure that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Informational

Confidentiality is important for three main reasons…

Obj. 1.2 - Summarize fundamental security concepts | Confidentiality

A
  • To protect personal privacy
  • To maintain a business advantage
  • To achieve regulatory compliance

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define / Explain

Encryption

Obj. 1.2 - Summarize fundamental security concepts | Confidentiality

A

Process of converting data into a code to prevent unauthorized access

(5) Basic methods of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define / Explain

Access Controls

Obj. 1.2 - Summarize fundamental security concepts | Confidentiality

A

By setting up strong user permissions, you ensure that only authorized personnel can access certain types of data

(5) Basic methods of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define / Explain

Data Masking

Obj. 1.2 - Summarize fundamental security concepts | Confidentiality

A

Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users

(5) Basic methods of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define / Explain

Physical Security Measures

Obj. 1.2 - Summarize fundamental security concepts | Confidentiality

A

Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations

(5) Basic methods of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define / Explain

Training & Awareness

Obj. 1.2 - Summarize fundamental security concepts | Confidentiality

A

Conduct regular training on the security awareness best practices that employees can use to protect their organization’s sensitive data

(5) Basic methods of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Informational

Integrity…

Obj. 1.2 - Summarize fundamental security concepts | Integrity

A
  • Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
  • Verifies the accuracy and trustworthiness of data over the entire lifecycle

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Informational

Integrity is important for three main reasons…

Obj. 1.2 - Summarize fundamental security concepts | Integrity

A
  • To ensure data accuracy
  • To maintain trust
  • To ensure system operability

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Informational

To help us maintain the integrity of our data, systems, and networks, we usually utilize five methods

Obj. 1.2 - Summarize fundamental security concepts | Integrity

A
  • Hashing
  • Digital Signatures
  • Checksums
  • Access Controls
  • Regular Audits

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define / Explain

Hashing

Obj. 1.2 - Summarize fundamental security concepts | Integrity

A

Process of converting data into a fixed-size value

(5) Methods of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define / Explain

Digital Signatures

Obj. 1.2 - Summarize fundamental security concepts | Integrity

A

Ensures both integrity and authenticity

(5) Methods of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define / Explain

Checksums

Obj. 1.2 - Summarize fundamental security concepts | Integrity

A

Method to verify the integrity of data during transmission

(5) Methods of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define / Explain

Access Controls

Obj. 1.2 - Summarize fundamental security concepts | Integrity

A

Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations

(5) Methods of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define / Explain

Regular Audits

Obj. 1.2 - Summarize fundamental security concepts | Integrity

A

Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed

(5) Methods of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define / Explain

Availability

Obj. 1.2 - Summarize fundamental security concepts | Availability

A

Ensures that information, systems, and resources are accessible and operational when needed by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Informational

As cybersecurity professionals, we value availability since it can help us with the following…

Obj. 1.2 - Summarize fundamental security concepts | Availability

A
  • Ensuring Business Continuity
  • Maintaining Customer Trust
  • Upholding an Organization’s Repudiation

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Informational, both sides

To overcome the challenges associated with maintaining availability, the best strategy is to use redundancy in your systems and network designs

Obj. 1.2 - Summarize fundamental security concepts | Availability

A

To overcome the challenges associated with maintaining availability, the best strategy is to use redundancy in your systems and network designs

Informational, both sides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Define / Explain

Redundancy

Obj. 1.2 - Summarize fundamental security concepts | Availability

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Informational

There are various types of redundancy you need to consider when designing your systems and networks…

Obj. 1.2 - Summarize fundamental security concepts | Availability

A
  • Server Redundancy
  • Data Redundancy
  • Network Redundancy
  • Power Redundancy

Informational

43
Q

Define / Explain

Server Redundancy

Obj. 1.2 - Summarize fundamental security concepts | Availability

A

Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over the load to continue supporting your end users

44
Q

Define / Explain

Data Redundancy

Obj. 1.2 - Summarize fundamental security concepts | Availability

A

Involves storing data in multiple places

45
Q

Define / Explain

Network Redundancy

Obj. 1.2 - Summarize fundamental security concepts | Availability

A

Ensures that if one network path fails, the data can travel through another route

46
Q

Define / Explain

Power Redundancy

Obj. 1.2 - Summarize fundamental security concepts | Availability

A

Involes using backup power sources, like generators and UPS systems

UPS = Uninterruptable Power Supply

47
Q

Informational

Non-repudiation

Obj. 1.2 - Summarize fundamental security concepts | Non-repudiation

A
  • Focused on providing undeniable proof in the world of digital transactions
  • Security measure that ensures individuals or entities involved in a communication or transaction cannot deny their participation or the authenticity of their actions

Informational

48
Q

Informational

Digital Signatures

Obj. 1.2 - Summarize fundamental security concepts | Non-repudiation

A
  • Considered to be unique to each user who is operating within the digital domain
  • Created by first hashing a particular message or communication that you want to digitally sign, and then it encrypts that hash digest with the user’s private key using asymmetric encryption

Informational

49
Q

Informational

Non-repudiation is important for three main reasons…

Obj. 1.2 - Summarize fundamental security concepts | Non-repudiation

A
  • To confirm the authenticity of digital transactions
  • To ensure the integrity of critical communications
  • To provide accountability in digital processes

Informational

50
Q

Define / Explain

Authentication

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A

Security measure that ensures invidivuals or entities are who they claim to be during a communication or transaction

51
Q

Informational

Five commonly used authentication methods are…

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A
  • Something you know (Knowledge Factor)
  • Something you have (Possession Factor)
  • Something you are (Inherence Factor)
  • Something you do (Action Factor)
  • Somewhere you are (Location Factor)

Informational

52
Q

Define / Explain

Something you know

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A

Relies on information that a user can recall

Knowledge Factor

(5) commonly used authentication methods

53
Q

Define / Explain

Something you have

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A

Relies on the user presenting a physical item to authenticate themselves

Possession Factor

(5) commonly used authentication methods

54
Q

Define / Explain

Something you are

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A

Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be

Inherence Factor

(5) commonly used authentication methods

55
Q

Define / Explain

Something you do

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A

Relies on the user conducting a unique action to prove who they are

Action Factor

(5) commonly used authentication methods

56
Q

Define / Explain

Somewhere you are

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A

Relies on the user being in a certain geographic location before access is granted

Location Factor

(5) commonly used authentication methods

57
Q

Define / Explain

Multifactor Authentication System

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A

Security process that requires users to provide multiple methods of identification to verify their identity

MFA = Multifactor Authentication

58
Q

Informational

Authenticaiton is critical to understand because of the following…

Obj. 1.2 - Summarize fundamental security concepts | Authentication

A
  • To prevent unauthorized access
  • To protect user data and privacy
  • To ensure that resources are accessed by valid users only

Informational

59
Q

Define / Explain

Authorization

Obj. 1.2 - Summarize fundamental security concepts | Authorization

A

Pertains to the permissions and privileges granted to users or entities after they have been authenticated

60
Q

Informational

Authorization mechanisms are important to help us with the following…

Obj. 1.2 - Summarize fundamental security concepts | Authorization

A
  • To protect sensitive data
  • To maintain the system integrity in our organizations
  • To create a more streamlined user experience

Informational

61
Q

Define / Explain

Accounting

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded

62
Q

Informational

Your organization should use a robust accounting system so that you can create the following…

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A
  • Create an audit trail
  • Maintain regulatory compliance
  • Conduct forensic analysis
  • Perform resource optimization
  • Achieve user accountability

Informational

63
Q

Define / Explain

Create an audit trail

Accounting System

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a source or point in time

64
Q

Define / Explain

Maintain regulatory compliance

Accounting System

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Maintains a comprehensive record of all users’ activities

65
Q

Define / Explain

Conduct forensic analysis

Accounting System

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Uses detailed accounting and event logs that can help cybersecurity experts understand what happened, how it happened, and how to prevent similar incidents from occurring again

66
Q

Define / Explain

Perform resource optimization

Accounting System

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Organizations can optimize system performance and minimize costs by tracking resource utilization and allocation decisions

67
Q

Define / Explain

Achieve user accountability

Accounting System

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Thorough accounting system ensures users’ actions are monitored and logged, deterring potential misuse and promoting adherence to the organization’s policies

68
Q

Informational

To perform accounting, we usually use different technologies like the following…

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A
  • Syslog Servers
  • Network Analysis Tools
  • SIEM Systems

SIEM = Security Information and Event Management

Informational

69
Q

Define / Explain

Syslog Servers

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organization’s systems

Example: Kiwi Syslog Server NG by SolarWinds

70
Q

Define / Explain

Network Analysis Tools

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Used to capture and analyze network traffic so that network administrators can gain detailed insights into all the data moving within a network

Example: Wireshark

71
Q

Define / Explain

SIEM Systems

SIEM = Security Information and Event Management

Obj. 1.2 - Summarize fundamental security concepts | Accounting

A

Provides us with real-time analysis of security alerts generated by various hardware and software infrastructure in an organization

Example: Splunk

72
Q

Informational

(4) Broad Categories of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories

A
  • Technical Controls
  • Managerial Controls
  • Operational Controls
  • Physical Controls

Informational

73
Q

Define / Explain

Technical Controls

(4) Broad Categories of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories

A

Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks

74
Q

Define / Explain

Managerial Controls

(4) Broad Categories of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories

A
  • Sometimes also referred to as administrative controls
  • Involves the strategic planning and governance side of security
75
Q

Define / Explain

Operational Controls

(4) Broad Categories of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories

A
  • Procedures and measures that are designed to protect data on a day-to-day basis
  • Are mainly governed by internal processes and human actions
76
Q

Define / Explain

Physical Controls

(4) Broad Categories of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Categories

A

Tangible, real-world measures taken to protect assets

77
Q

Informational

(6) Basic Types of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Types

A
  • Preventic Controls
  • Deterrent Controls
  • Detective Controls
  • Corrective Controls
  • Compensating Controls
  • Directive Controls

Informational

78
Q

Define / Explain

Preventive Controls

(6) Basic Types of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Types

A

Proactive measures implemented to thwart potential security threats or breaches

79
Q

Define / Explain

Deterrent Controls

(6) Basic Types of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Types

A

Discourage potential attackers by making the effort seem less appealing or more challenging

80
Q

Define / Explain

Detective Controls

(6) Basic Types of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Types

A

Monitor and alert organizations to malicious activities as they occur or shortly thereafter

81
Q

Define / Explain

Corrective Controls

(6) Basic Types of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Types

A

Mitigate any potential damage and restore our systems to their normal state

82
Q

Define / Explain

Compensating Controls

(6) Basic Types of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Types

A

Alternative measures that are implemented when primary security controls are not feasible or effective

83
Q

Define / Explain

Directive Controls

(6) Basic Types of Security Controls

Obj. 1.1 - Summarize fundamental security concepts | Security Control Types

A
  • Guide, inform, or mandate actions
  • Often rooted in policy or documentation and set the standards for behavior within an organization
84
Q

Define / Explain

Gap Analysis

Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis

A

Process of evaluating the differences between an organization’s current performance and its desired performance

85
Q

Informational, both sides

Conducting a gap analysis can be a valuable tool for organizations looking to improve their operations, processes, performance, or overall security posture

Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis

A

Conducting a gap analysis can be a valuable tool for organizations looking to improve their operations, processes, performance, or overall security posture

Informational, both sides

86
Q

Informational

There are several steps involved in conducting a gap analysis…

Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis

A
  • Define the scope of the analysis
  • Gather data on the current state of the organization
  • Analyze the data to identify any areas where the organization’s current performance falls short of its desired performance
  • Develop a plan to bridge the gap

Informational

87
Q

Informational

(2) Basic Types of Gap Analysis

Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis

A
  • Technical Gap Analysis
  • Business Gap Analysis

Informational

87
Q

Define / Explain

Technical Gap Analysis

(2) Basic Types of Gap Analysis

Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis

A
  • Involves evaluating an organization’s current technical infrastructure
  • Identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions
88
Q

Define / Explain

Business Gap Analysis

(2) Basic Types of Gap Analysis

Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis

A
  • Involves evaluating an organization’s current business processes
  • Identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions
89
Q

Informational

Plan of Action and Milestones (POA&M)

Obj. 1.2 - Summarize fundamental security concepts | Gap Analysis

A
  • Outlines the specific measures to address each vulnerability
  • Allocate resources
  • Set up timelines for each remediation task that is needed

POA&M = Plan of Action & Milestones

90
Q

Informational, both sides

Zero Trust demands verification for every device, user, and transaction within the network, regardless of its origin

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Zero Trust demands verification for every device, user, and transaction within the network, regardless of its origin

Informational, both sides

91
Q

Informational

To create a zero trust architecture, we need to use two different planes

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A
  • Control Plane
  • Data Plane

Informational

92
Q

Define / Explain

Control Plane

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization

93
Q

Informational

Control Plane typically ecompasses several key elements…

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A
  • Adaptive Identity
  • Threat Scope Reduction
  • Policy-Driven Access Control
  • Secured Zones

informational

94
Q

Define / Explain

Adapative Identity

Control Plane elements

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Relies on real-time validation that takes into account the user’s behavior, device, location, and more

95
Q

Define / Explain

Threat Scope Reduction

Control Plane elements

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A
  • Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface
  • Focused on minimizing the “blast radius” that could occur in the event of a breach
96
Q

Define / Explain

Policy-Driven Access Control

Control Plane elements

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Entails developing, managing, and enforcing user access policies based on their roles and responsibilities

97
Q

Define / Explain

Secured Zones

Control Plane elements

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Isolated environments within a network that are designed to house sensitive data

98
Q

Informational, both sides

Control Plane uses a Policy Engine and a Policy Administrator to make decisions about access

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Control Plane uses a Policy Engine and a Policy Administrator to make decions about access

Informational, both sides

99
Q

Define / Explain

Policy Engine

Control Plane decisions about access

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Cross-references the access request with its predefined policies

100
Q

Define / Explain

Policy Administrator

Control Plane decisions about access

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Used to establish and manage the access policies

101
Q

Informational

Data Plane consists of the following…

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A
  • Subject / System
  • Policy Enforcement Point

Informational

102
Q

Define / Explain

Subject / System

Data Plane definitions

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Refers to the individual or entity attempting to gain access

103
Q

Define / Explain

Policy Enforcement Point

Data Plane definitions

Obj. 1.2 - Summarize fundamental security concepts | Zero Trust

A

Where the decision to grant or deny access is actually executed