Introduction Flashcards

1
Q

Information Security

A

Protect the privacy and integrity of data at rest or on the go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Security

A

Protect computer network from attacks or malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational Security

A

Create and maintain processes, procedures and decision-making for processing and protection of data assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three pillars of cybersecurity

A

People (Training, Authorization control)
Processes (Policies, Audits)
Technology (Antivirus, Firewalls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST Cyber Framework 5 phases

A

Identify (Asset Management, Risk Assessment)

Protect (Data Security, Maintenance)

Detect (Anomalies and Events)

Respond (Mitigation, Improvements)

Recover (Recovery Planning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA Triangle

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access (Concept)

A

The ability of a subject or object to use, manipulate, modify, or affect another subject or object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asset (Concept)

A

The organizational resource that is being protected. An asset can be logical or intangible, such as a Web site, software information, or data; or an asset can be physical or tangible, such as a person, computer system, hardware, or other tangible object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack (Concept)

A

An intentional or unintentional act that may damage or compromise the information and systems that support it. Attacks may be active or passive, intentional or unintentional and indirect or indirect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Control, Safeguard or Countermeasure (Concept)

A

Security mechanisms, policies, or procedures that can contain attacks, reduce risks, resolve vulnerabilities, and otherwise improve security within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exploit (Concept)

A

A technique used to compromise a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exposure (Concept)

A

A condition or state of exposure; in information security, exposure exists when a vulnerability is known to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Loss (Concept)

A

An instance of an information asset that suffers unintentional or unauthorized damage or destruction, modification or disclosure or denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Profile (Concept)

A

The entire set of controls and safeguards, including policy, education, training and awareness raising, and technology, that the organization implements to protect the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk (Concept)

A

The probability of an unwanted occurrence, such as an adverse event or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat (Concept)

A

Any event or circumstance that has the potential to adversely affect the operations and assets

17
Q

Threat Agent (Concept)

A

The specific instance or component of a threat

18
Q

Threat Event (Concept)

A

An occurrence of an event caused by a threat agent

19
Q

Threat Source (Concept)

A

A category of objects, persons, or other entities that represent the source of the hazard for an asset

20
Q

Vulnerability (Concept)

A

A potential weakness in an asset or defensive control system

21
Q

Role of security professional is of

A

advisor and not decision-maker

22
Q

Tangible Assets Examples

A

Servers, disk drivers, data center, optical disks, rooms, buildings, workers

23
Q

Intangible Assets Examples

A

Software, data, intellectual property (IP), business secrets

24
Q

Threats - Typology

A

Natural (Tornados, etc)
Technical (Disk or Server failure)
Man-Made (Deliberate attacks)
Supply System (Electricity, water)

25
Q

What is a Virus?

A

Malware that spreads with human collaboration

26
Q

What is a Worm?

A

Malware that propagates itself

27
Q

What is a Trojan Horse?

A

Malware that appears to be benign

28
Q

What is a Logic Bomb?

A

Malicious code hidden in software, activated by attacker

29
Q

What is a Backdoor?

A

Hidden bypass of system authentication

30
Q

Attack automation involves 4 phases

A
  • Search for victims
  • Commitment to vulnerable systems
  • Spread of attack
  • Coordinated management of attack tools