Introduction to Security Flashcards

1
Q

What is Information Security?

A

The practice of protecting sensitive information from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 Security Concepts?

A

C.I.A Triad (Confidentiality, Integrity, Availability)

Tripe A.A.A Model (Authentication, Authorization, Accounting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three types of information protection and what are they known as?

A

Confidentiality, Integrity, Availability

Also known as the C.I.A Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Confidentiality?

A

Ensures only authorized individuals have access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Integrity?

A

Ensures information is correct and unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Availability?

A

Ensures information is accessible to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Triple A.A.A Model?

A

Authentication,Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Authentication?

A

Verifying a user’s credentials before giving them access to a Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Authorization?

A

Grants the Authenticated user access to the available services based on their credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Accounting?

A

Provides a record of what services a user accessed and when they were accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Security Controls?

A

A safeguard used to protect the C.I.A of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is there a difference between Cybersecurity and Information Security?

A

Cybersecurity is the umbrella term where Information Security is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Threat Actor?

A

An individual or entity that gains unauthorized access to systems with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Script Kiddie (Threat)?

A

An unskilled attacker who lacks the technical knowledge to perform attacks and relies on pre-built tools to carry out their attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Shadow IT(Threat)?

A

Process of bypassing corporate approval for technology purchases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why would Organized Crime move into Cyber Attacks

A

For financial gain and taking a less risky route.

17
Q

What are Insider Threats?

A

Trusted employees or individuals of an enterprise who exploit vulnerabilities within that organization

18
Q

What are Hacktivists(Threat)?

A

An individual or group who gains unauthorized access to systems to further their political or social agendas.

19
Q

What are State Actors(Threat)?

A

Individuals or groups sponsored by a government to perform attacks on other rival governments.

20
Q

What is an A.P.T(Threat)?

A

An Advanced Persistent Threat is a multiyear intrusion campaign primarily performed by State Actors.

21
Q

What is a Competitor(Threat)?

A

An entity that launches attacks against rival companies.

22
Q

What is a Broker(Threat)

A

An individual who sells their knowledge of vulnerabilities to other attackers or governments.

23
Q

What is a Cyber Terrorist(Threat)?

A

Attacks a nation’s infrastructure to cause disruption and panic.

24
Q

What is a Threat Vector?

A

Methods used by Threat Actors to perform exploits.

25
Q

What is a Framework?

A

Policies and procedures used to secure enterprise information.