Fundamentals of Security Flashcards

1
Q

What is the Zero Trust security model about?

A

Zero trust is a security model that advocates for a “never trust, always verify” approach. This approach assumes no user or system is trusted by default and requires continuous verification to access organizational resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the CIA triad?

A

Confidentiality, Integrity, and Availability. These are the three pillars of cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the meaning of the confidentiality pillar in cybersecurity?

A

Confidentiality is the protection of data from unauthorized access and disclosure to ensure that only those with the necessary rights can view it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the meaning of the integrity pillar in cybersecurity?

A

Integrity focuses on the assurance that data is trustworthy and accurate, and hasn’t been modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the meaning of the availability pillar in cybersecurity?

A

Availability ensures that data or services are accessible to authorized users when they need them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the meaning of non-repudiation in cybersecurity?

A

Non-repudiation guarantees that a specific action or event has taken place and cannot be denied by the parties involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does CIANA stands for?

A

Confidentiality, Integrity, Availability, Non-repudiation, and Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do the triple AAAs of security stand for?

A

Authentication verifies an entity’s identity before granting access to a resource. Authorization determines what rights or privileges a user has after they are authenticated. Accounting tracks and logs user activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Security Controls?

A

Security controls are measures or mechanisms put in place to mitigate risks and protect the CIA of information systems and their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different categories into which security controls can be classified?

A

Technical Controls: tools or pieces of software that can protect the system’s integrity, confidentiality, or availability, such as: installing antiviruses, Firewalls, encryption processes, and intrusion detection systems.

Managerial Controls: administrative controls. Involve the strategic planning and governance side of security.

Operational Controls: procedures and measures designed to protect data on a day-to-day basis, such as a password policy, backup procedures, account reviews, and user training programs.

Physical Controls: tangible, real-world measures taken to protect assets, such as surveillance cameras, biometrics, reinforced doors, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the different types of security controls?

A

Preventive Controls: firewall

Deterrent Controls:

Detective Controls: are used to detect and alert about incidents. IDS (Intrusion Detection System)

Corrective Controls: address issues after they arise. Mitigate any potential damage and restore the system to its normal state.

Compensating Controls: provide alternatives to primary controls.

Directive Controls: are policies or procedures that dictate specific actions or behaviors by users or systems. Such as a policy issued by the CTO mandating password resets every 60 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Control Plane and Data Plane in Zero Trust architecture.

A

In a Zero Trust architecture, the control plane manages access policies and authentication, while the data plane handles the actual data transfer and application traffic based on those policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a secure zone?

A

A secure zone is an isolated environment within a network that is designed to house sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly