Lesson 1 Flashcards

1
Q

what is information security?

A

state of data, action that an org needs to take, best practices against unknown/unnamed threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

assets should be protected in this order (highest to lowest)

A

people -> data -> hardware/software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

compliance does not mean

A

secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

parkerian hexad model includes

A

confidentiality
integrity
availability
possession/control
authenticity
utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to the proper attribution as the owner or creator of the data in question

A

parkerian hexad - authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

describes how useful some data is

A

parkerian hexad - utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attack type allows attacked to intercept data as it’s being processed, against confidentiality

A

interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attack type make assets unusable/unavailable on temporary or permanent basis, against availability and integrity

A

interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

attack type that involves tampering with an asset, against availability and integrity

A

modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

attack type that involves generating data, processes, communications, or other activities within a system, against integrity and availability

A

fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

likelihood an event will occur, requires threat and vulnerability

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

events that could cause damage to assets

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

weakness that a threat event or agent can take advantage of

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

additional step that is taking into account an asset’s cost following an event

A

impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

risk management steps

A

identify assets
identify threats
assess vulnerabilities
assess risks
mitigate risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

measures used to alleviate risk

A

controls - physical, logical, administrative

17
Q

examples of this type of control include locks, doors, guards

18
Q

examples of this type of control include firewalls, IDS, IPS

A

logical/(technical)

19
Q

examples of this type of control include governance policies (acceptable use, etc.)

A

administrative

20
Q

incident response steps

A

preparation
detection and analysis
containment
eradication
recovery
post incident activity