Information Security Fundamentals Flashcards

1
Q

Define the elements of Information Security:
1) Confidentiality
2) Integrity
3) Availability
4) Authenticity
5) Non-Repudiation

A

1) Information is only accessible to those that are authorized to have access.
2) The trustworthiness of the data, that it is unchanged
3) That data is always accessible when required.
4) Refers to the data being sent from a genuine source.
5) That the sender/receipient of a message cannot deny that they accessed it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the elements of the SFU Triangle:
1) Security
2) Functionality
3) Usability

A

1) Restrictions
2) Features
3) GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the categories of the NIST Cybersecurity Framework:
1) Identify
2) Protect
3) Detect
4) Respond
5) Recover

A

1) Helps an organization understand its environment and manage cybersecurity risks.
2) Implementing safeguards to ensure the delivery of critical services.
3) Involves monitoring and detecting anomalies and incidents in a timely manner.
4) Outlines the steps necessary to respond to a detected cybersecurity incident.
5) Focuses on restoring services and systems affected by a cybersecurity event to their normal state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the types of Network Defense Approaches:
1) Preventive
2) Reactive
3) Retrospective
4) Proactive

A

1) Methods that are used to avoid attacks.
2) Methods that are used to detect attacks.
3) Methods to examine the causes for attacks, contain, remediate and recover from damage.
4) Informed decisions on potential attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the Continual/Adaptive Security Strategy
1) Protect
2) Detect
3) Respond
4) Predict

A

1) Prior countermeasures taken to eliminating all possible threats.
2) Continuous monitoring for abnormalities and their source.
3) Actions to contain, eradicate, mitigate and recover ffrom attacks.
4) Identifying the most likely attacks, targets and methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly