IS 3120 CHAPTER 15 Flashcards
A collection of all the vulnerable points of a system
Attack surface
The security requirement that information be available to authorized users when they want it.
Availability
Process that results in a list of activities necessary for an organization to conduct business operations.
Business impact analysis (BIA).
Multiple countermeasures that an attacker must compromise to reach any protected resource. It is often described as a series of concentric rings around protected resources.
Defense in depth.
A separate network that allows connections from external networks and internal LANs; in most cases, it is separated from each network by a firewall.
Demilitarized zone (DMZ)
A program or dedicated hardware device that inspects network traffic passing through it. It then denies or permits that traffic based on a set of rules determined from a stored configuration.
Firewall
A special team formed to handle security incidents when they occur.
Incident response team (IRT)
The security principle that users possess only the minimum access privileges that need to compete their assigned tasks.
Least privilege
.A method that ranks risks relative to one another
Qualitative risk analysis
A method that associates a dollar value, or cost, with each risk.
Quantitative risk analysis
The likelihood that an attack will successfully expo it a vulnerability.
Risk
The process of identifying and addressing all risks.
Risk management
Any event that results in a violation of any of the “CIA” (confidentiality, integrity, and availability)
Security breach
A countermeasure that protects resources from attack.
Security control
An analysis that identifies known vulnerabilities for which there are no security controls in place.
Security gap analysis
The three basic properties of information security: confidentiality, integrity, and availability.
Security triad
Any action that could damage an asset
Threat
Any weakness in a system that makes it possible for a threat to cause it harm.
Vulnerability
- The right mix of security controls can make a network completely secure.
TRUE OR FALSE
FALSE
- The CIA triad includes which three security properties?
- Consistency, integrity, authorization
- Confidentiality, isolated, authorization
- Confidentiality, integrity, availability
- consistency, isolated, availability
Confidentiality, integrity, availability
- Which security property assures that only authorized users can modify sensitive information?
- Confidentiality
- Integrity
- Consistency
- Isolated
Integrity
- Which term describes the cumulative opportunities for attackers to compromise a system?
- Risks
- Present threats
- Known vulnerabilities
- Attack surface
Attack surface
- A ___ is any event that results in a violation of any of the CIA security properties.
Security Breach
- An eavesdropping attack violates which CIA property?
- Confidentiality
- Integrity
- Consistency
- Isolated
Confidentiality
- Which term best describes any event that could damage an asset?
- Event
- Threat
- Risk
- Vulnerability
Threat
- Which term best describes any weakness in a system that can allow an attack to clause harm?
- Event
- Threat
- Risk
- Vulnerability
Vulnerability
- A ___ risk assessment ranks risks relative to one another.
Qualitative
- Which of the following courses of action is best if the cost to mitigate a risk exceeds the expected loss if the risk is realized?
- Mitigate
- Assign
- Accept
- Avoid
Accept
- Insurance is a common form of which type of risk handling?
- Mitigate
- Assign
- Accept
- Avoid
Assign
- Which of the following best describes the principle of least privilege?
- Allow users only the minimum access required to complete assigned tasks
- Allow users the maximum access allowed for their job function
- Restrict users from accessing any data they do not need to know
- Ensure users have at least the minimum access required to complete assigned tasks
Allow users only the minimum access required to complete assigned tasks