General Security Concepts Flashcards

1
Q

Technical Controls

A

Controls implemented using hardware, software, and/or firmware.
Examples: Firewalls, anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Managerial Controls

A

Relate to risk management, governance, oversight, strategic alignment and decision making Examples: risk assessments, project management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational Controls

A

Aligned with a processes that are primarily implemented and executed by people.
Examples: change management, training, testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Controls

A

Designed to address physical interactions like connected to buildings.
Examples: gates, barricades, fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventive Control

A

Stop a threat agent from being successful
Examples: Firewall rules, security policy, security guard, door locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent Control

A

Discourage a threat agent from acting
Examples: posted warning signs, threat of demotion, splash screen, reception desk,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detective Control

A

Identify and report a threat agent or action
Examples: System logs, review login reports, patrol the property, motion detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Corrective Control

A

Minimize the impact of a threat agent or modify or fix a situation
Examples: Backups, fire extinguisher, policies for reporting issues, contact authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compensating Control

A

Controls implemented in lieu of a recommended control that provides comparable protection
Examples: Block instead of patch, separation of duties, require multiple security staff, power generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Directive Control

A

Proactive actions taken to cause/encourage a desirable event or outcome to occur
Examples: Trainings, policies, and authorized personnel only sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA Traid

A

Fundamentals of security
Confidentiality: prevents disclosure of information to unauthorized people or systems
Integrity: Information can’t be modified
Availability: Systems and networks must be up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Controls

A

Selectively restrict access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing

A

Map data of a length to data of a fixed length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital signatures

A

Math scheme to verify the integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Certificates

A

Combine with a digital signature to verify an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Non-Repuditation

A

Provides proof of integrity, can be asserted to be genuine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Redundancy

A

Build services that will always be available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fault tolerance

A

system will continue to run, even when a failure occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AAA

A

Authentication: Verifies a user and who they claim to be
Authorization: Determines if the user has permission to use a resource or access a file.
Accounting: Keeps track of a user’s activity on the system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Certificate Authority (CA)

A

Stores, signs, and issues digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Registration Authority (RA)

A

Verifies user requests for a digital certificate and tells the CA to issue it.

22
Q

Honeypot

A

Decoy server set up to trick an attacker

23
Q

Honeyfile

A

A decoy file deceptively named so it attracts the attention of an attacker

24
Q

Honeynet

A

A network of honeypots.

25
Q

Honeytoken

A

A beacon embedded somewhere that can bait and track an attacker

26
Q

Gap Analysis

A

The process of evaluating your org’s current security posture and security framework

27
Q

Least Privilege

A

Granting users only the access necessary to perform their job functions

28
Q

Malware

A

Malicious software designed to harm, exploit, or compromise a system.

29
Q

Defense in Depth

A

Implementing multiple layers of security controls to protect information.

30
Q

Vulnerability Assessment

A

Process of identifying, quantifying, and prioritizing vulnerabilities in a system.

31
Q

Zerto Trust Architecture

A

Security model that assumes no implicit trust and requires continuous verification.

32
Q

Data Loss Prevention (DPL)

A

Strategies and tolls to prevent unauthorized access, use, or transmission of data

33
Q

Public Key Infrastructure (PKI)

A

A framework for managing digital certificates and public key encryption

34
Q

Symmetric Encryption

A

Encryption method where the same key is used for both encryption and decryption.

35
Q

Asymmetric Encryption

A

Encryption method that uses a pair of keys a public key for encryption and a private key for decryption

36
Q

Pharming

A

Cyberattack that redirects a website’s traffic to a fraudulent website without a user’s consent.

37
Q

SQL Injection

A

Attack that involves inserting malicious SQL code into a query to a manipulate the database.

38
Q

Cross Site Scripting

A

A vulnerability that allows attackers to inject malicious scripts into a web pages viewed by other users

39
Q

Twofish

A

Symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

40
Q

Diffie-Hellman Key Exchange

A

Allows two parties to securely share a secret key over an unsecured communication channel

41
Q

Mandatory Access Control (MAC)

A

Access control policy determined by a central authority, strictly enforcing access based on classifications

42
Q

Discretionary Access Control (DAC)

A

Access control policy where the owner of the resource determines who has access

43
Q

Role-Based Access Control (RBAC)

A

Access Control method where permissions are assigned to roles, and users are assigned to roles based on their responsibilities.

44
Q

Demilitarized Zone (DMZ)

A

A physical or logical subnetwork that separates and internal LAN from untrusted external networks

45
Q

Network Address Translation (NAT)

A

Translates private IP’s to a public IP and vice versa to enable devices on a private network to access the internet

46
Q

Virtual Land Area Network (VLAN)

A

Logical subdivision of a physical network designed to group devices, reduce traffic, and enhance security

47
Q

Port Security

A

Network security feature on switches that limit access by controlling which devices can connect to specific ports based on their MAC address

48
Q

ARP Spoofing

A

Attack where an attack sends ARP messages to associate their MAC address with a legit IP to intercept data

49
Q

DHCP Snooping

A

Security Feature that prevents unauthorized or rouge DHCP servers from assigning IP’s on a network by filtering DHCP messages and verifying trusted sources

50
Q

SSL/TLS

A

Protocols used to secure communication over a network by encrypting data in transit, ensuring confidentiality, and Integrity