Fundamentals Of Security Flashcards

1
Q

What does the C.I.A Triad stand for?

A

Confidentiality, Integrity, Availability

These are the 3 pillars of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Confidentiality?

A

Ensures that information is only accessible to those with appropriate authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Integrity?

A

Ensures that data remains accurate and unaltered unless modifications are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability?

A

Ensures that information and resources are accessible and functional when needed by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does C.I.A.N.A stand for?

A

Confidentiality, Integrity, Availability, Non-repudiation, Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Non-repudiation?

A

Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.

Example: Digital signatures in emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Authentication?

A

Process of verifying the identity of a user or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does A.A.A stand for?

A

Authentication, Authorization, Accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Authorization?

A

Defines what actions or resources a user can access or perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Accounting?

A

Act of tracking user activities and resource usage, used for audit or billing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Security Controls?

A

Measures put in place to mitigate risk and protect the confidentiality, integrity, and availability of information systems and data.

Example: Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Zero Trust security model?

A

A security model that operates on the principle that no one, inside or out of the organization, should be trusted by default (verification required from anyone trying to gain access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Control Plane?

A

Consists of adaptive identity, threat scope reduction, policy-driven access control, and secured zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Data Plane?

A

Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is needed to achieve Zero Trust?

A

Control Plane and Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Information Security?

A

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Information Systems Security?

A

The act of protecting the systems that hold and process critical data.

18
Q

What is a threat?

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems.

Threats can come from natural disasters, cyber-attacks, data integrity breaches, or disclosure of confidential information.

19
Q

What are examples of sources of threats?

A

Natural disasters, cyber-attacks, data integrity breaches, and disclosure of confidential information.

20
Q

What is a vulnerability?

A

Any weakness in the system design or implementation.

Vulnerabilities can arise from internal factors.

21
Q

What are examples of internal factors that can create vulnerabilities?

A

Software bugs, misconfigured software, improperly protected network devices, missing security patches, and lack of physical security.

22
Q

What are the three main reasons for confidentiality?

A
  1. To protect personal privacy
  2. To maintain a business advantage
  3. To achieve regulatory compliance
23
Q

What are the five basic methods to ensure confidentiality?

A
  1. Encryption
  2. Access Controls
  3. Data Masking
  4. Physical Security Measures
  5. Training and Awareness
24
Q

What is encryption?

A

Process of converting data into a code to prevent unauthorized access.

25
Q

What are access controls?

A

Setting up strong user permissions to ensure that only authorized personnel can access certain types of data.

26
Q

What is data masking?

A

Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users.

27
Q

What are physical security measures?

A

Measures that ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations.

28
Q

What is the purpose of training and awareness in confidentiality?

A

Conducting regular training on security awareness best practices that employees can use to protect their organization’s sensitive data.

29
Q

What are the three main reasons integrity is important?

A
  1. To ensure data accuracy
  2. To maintain trust
  3. To ensure system operability
30
Q

What are the five methods used to maintain data integrity?

A
  1. Hashing
  2. Digital Signatures
  3. Checksums
  4. Access Controls
  5. Regular Audits
31
Q

What is hashing?

A

Hashing is the process of converting data into a fixed-size value.

32
Q

What do checksums ensure?

A

Checksums ensure both integrity and authenticity.

They verify the integrity of data during transmission.

33
Q

What is the purpose of access controls?

A

Access controls ensure that only authorized individuals can modify data, reducing the risk of unintentional or malicious alterations.

34
Q

What do regular audits involve?

A

Regular audits involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed.

35
Q

What is availability in cybersecurity?

A

Availability ensures that information, systems, and resources are accessible and operational when needed by authorized users.

36
Q

Why do cybersecurity professionals value availability?

A

Availability helps with ensuring business continuity, maintaining customer trust, and upholding an organization’s reputation.

37
Q

What is the best strategy to maintain availability?

A

The best strategy is to use redundancy in your systems and network designs.

38
Q

What is redundancy?

A

Redundancy is the duplication of critical components or functions of a system with the intention of enhancing its reliability.

39
Q

What is server redundancy?

A

Server redundancy involves using multiple servers in a load balanced or failover configuration to support end users if one server fails.

40
Q

What is data redundancy?

A

Data redundancy involves storing data in multiple places.

41
Q

What is network redundancy?

A

Network redundancy ensures that if one network path fails, the data can travel through another route.

42
Q

What is power redundancy?

A

Power redundancy involves using backup power sources, like generators and UPS systems.