Fundamentals of Security Flashcards

1
Q

What is information security?

A

Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is information system security?

A

Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of information security systems?

A

computers, servers, network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the CIA triad?
What does each one ensure?
Example of how each is achieved?

A

Confidentiality: Ensures information is accessible only to authorized personnel (e.g., encryption)

Integrity: Ensures data remains accurate and unaltered (e.g., checksums)

Availability: Ensures information and resources are accessible when needed (e.g.,
redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Non-repudiation?
Example of how it is achieved?

A

Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is CIANA pentagon?

A

An extension of the CIA triad with the addition of non-repudiation and
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the triple A’s of security?
Define each and give an example of each

A

Authentication: Verifying the identity of a user or system (e.g., password checks)

Authorization: Determining actions or resources an authenticated user can access (e.g., permissions)

Accounting: Tracking user activities and resource usage for audit or billing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the four security control categories

A

Technical, Managerial, Operational, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the six security control types

A

Deterrent, Detective, Directive, Corrective, Compensating, Preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the zero trust model operate on?

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To achieve zero trust we use the ———— and ———- plane

A

Control; Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give examples of what constitute both control plane and data plane

A

Control plane: Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones

Data plane: Subject/system, policy engine, policy administrator, and policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a threat?
List some of the things that threat could come from

A

Anything that could cause harm, loss, damage, or compromise to our information
technology systems

Natural disasters, Cyber-attacks, Data integrity breaches, Disclosure of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is vulnerability?
Vulnerability could come from?

A

Any weakness in the system design or implementation

Software bugs, Misconfigured software, Improperly protected network devices, Missing security patches, Lack of physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where threat and vulnerability intersect is where ———– lies

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat with no vulnerability = _______
Vulnerability with no threat = _______

A

No risk

17
Q

What is risk management?

A

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome

18
Q

What are the five methods used to achieve confidentiality?
Explain how each is implemented

A

1) Encryption: Process of converting data into a code to prevent unauthorized access

2) Access Controls: By setting up strong user permissions, you ensure that only authorized personnel can access certain types data

3) Data Masking: Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users

4) Physical Security Measures: Ensure confidentiality for both physical types of data, such as paper records stored in a filing cabinet, and for digital information contained on servers and workstations

5) Training and Awareness: Conduct regular training on the security awareness best practices that employees can use to protect their organization’s sensitive data

19
Q

List five methods used to maintain data integrity
Define each

A

Hashing: Process of converting data into a fixed-size value

Digital Signatures: Ensure both integrity and authenticity

Checksums: Method to verify the integrity of data during transmission

Access Controls: Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations

Regular Audits: Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are
immediately addressed

20
Q

What is redundancy?

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability

21
Q

Describe the four various types of redundancy

A

Server Redundancy: Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over the
load to continue supporting your end users

Data Redundancy: Involves storing data in multiple places

Network Redundancy: Ensures that if one network path fails, the data can travel through another route

Power Redundancy: Involves using backup power sources, like generators and UPS systems

22
Q

Digital signature for non-repudiation is created by first ______ a message or communication. Hash digest is then encrypted using the user’s _______ via ______encryption

A

Hashing; Private key; Assymetric

23
Q

What are the five commonly used authentication methods?

A

Something you know (Knowledge Factor)
Something you have (Possession Factor)
Something you are (Inherence Factor)
Something you do (Action Factor)
Somewhere you are (Location Factor)

24
Q

What is a Multi-factor authentication (MFA) system?

A

Security process that requires users to provide multiple methods of identification
to verify their identity

25
Q

List three different technologies used to perform accounting
Describe what each is used for

A

Syslog Servers: Used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies
in the organization’s systems

Network Analysis Tools: Used to capture and analyze network traffic so that network
administrators can gain detailed insights into all the data moving within a
network

Security Information and Event Management (SIEM) Systems: Provides us with a real-time analysis of security alerts generated by various hardware and software infrastructure in an organization

26
Q

What is gap analysis?

A

Process of evaluating the differences between an organization’s current
performance and its desired performance

27
Q

What are two basic types of gap analysis

A

Technical gap analysis: Involves evaluating an organization’s current technical infrastructure, identifying any areas where it falls short of the technical capabilities
required to fully utilize their security solutions

Business gap analysis: Involves evaluating an organization’s current business processes and Identifying any areas where they fall short of the capabilities required to
fully utilize cloud-based solutions

28
Q

What does Plan of Action and Milestones (POA&M) do?

A

1) Outlines the specific measures to address each vulnerability

2) Allocate resources

3) Set up timelines for each remediation task that is needed

29
Q

Explain each key element that encompass the control plane

A

Adaptive Identity: Relies on real-time validation that takes into account the
user’s behavior, device, location, and more

Threat Scope Reduction: Limits the users’ access to only what they need for their
work tasks. Focused on minimizing the “blast radius” that could occur
in the event of a breach

Policy-Driven Access Control: Entails developing, managing, and enforcing user access policies based on their roles and responsibilities

Secured Zones: Isolated environments within a network that are designed
to house sensitive data

30
Q

Explain each key element that encompass the data plane

A

Subject/System: Refers to the individual or entity attempting to gain access

Policy Engine: Cross-references the access request with its predefined policies

Policy Administrator: Used to establish and manage the access policies

Policy Enforcement Point: Where the decision to grant or deny access is actually
executed