Intro Flashcards

1
Q

Define the CIA Triad

A

The protection of information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What make up the CIA Triad

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Confidentiality

A

Confidentiality is synonymous with privacy. Confidentiality measures prevent data from falling into the hands of people who do not have authorization to access said information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Integrity

A

In the information technology world, integrity is all about making sure information is accurate and always stays that way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Availability

A

Ensuring availability requires routine maintenance and upgrading of hardware, software and operating system environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability

A

A flaw, loophole, oversight, or error that can be exploited to violate system security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat

A

A threat is an event, natural or man made, able to cause negative impact to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploit

A

An exploit is a defined way to breach the security of an IT system through a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk

A

It is a situation involving exposure to danger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerability Assessment

A

A vulnerability assessment is a search for these weaknesses/exposures in order to apply a patch or fix to prevent a compromise.
- Many systems are shipped with: known and unknown security holes and bugs, and insecure default settings (passwords, etc).
- Many vulnerabilities occur as a result of misconfigurations by system administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Roles in Information Security?

A

CISO (Chief Information Security Officer)
Information Security Architect
Information security consultant/ Specialist
Information security analyst
Information security auditor
Security software developer
Penetration tester/ Ethical hacker
Vulnerability assessor
digital forensic analyst
SEM Engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role of Information Security Officer

A

The chief information security officer is a high-level management position responsible for the entire computer security department and staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Information Security Analyst

A

this position conducts information security assessments for organizations and analyzes the events, alerts, alarms and any information that could be useful to identify any threats that could compromise the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Role of information security auditor

A

this position is in charge of testing the effectiveness of computer information systems, including the security of the systems and reports their findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Program

A

Evaluate, create teams, baselines, identify and model threats, uses cases, risk, monitoring and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asset Manage

A

classification, implementation steps, asset control, documents.

17
Q

Admin Controls

A

Policies, procedures, standards, user education, incident respond, disaster recovery, compliance and physical security.

18
Q

Tech Controls

A

Network infra, servers, identity management, vulnerability management, monitoring and logging.