Lesson 1: Fundamental Security Concepts and Frameworks Flashcards

1
Q

What is information security?

A

The practice of protecting data resources from unauthorized access, attacks, theft, or damage, ensuring confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is information security important?

A

It is crucial for maintaining trust and compliance with legal and regulatory requirements, safeguarding sensitive data from breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the CIA Triad stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of Confidentiality in information security?

A

Ensures that only authorized individuals can access sensitive information, often implemented through encryption and access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of Integrity in information security?

A

Guarantees that data is accurate and unaltered during storage and transmission, using techniques like checksums and hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the goal of Availability in information security?

A

Ensures that information is accessible to authorized users when needed, often supported by redundancy and failover systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Non-Repudiation?

A

A principle that ensures individuals cannot deny their actions, such as creating or modifying data, often implemented through digital signatures and logging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a cybersecurity framework?

A

Provides guidelines for securing processing hardware and software, ensuring a structured approach to managing cybersecurity risks.
It helps organizations establish a baseline for security practices and compliance with industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five functions of the NIST Cybersecurity Framework?

A
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the NIST Cybersecurity Framework, what is the purpose of Identify?

A

Develop security policies and evaluate risks to understand the organization’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the NIST Cybersecurity Framework, what is the purpose of Protect?

A

Implement measures to secure IT hardware and software throughout their lifecycle, including access controls and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the NIST Cybersecurity Framework, what is the purpose of Detect?

A

Monitor systems and controls to identify potential threats and vulnerabilities in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the NIST Cybersecurity Framework, what is the purpose of Respond?

A

Develop and implement response plans to analyze and eradicate threats effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the NIST Cybersecurity Framework, what is the purpose of Recover?

A

Restore systems and data after an attack, ensuring business continuity and minimal downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is gap analysis in the context of cybersecurity?

A

Identifies deviations between an organization’s current security systems and required framework standards, highlighting areas for improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose for doing a gap analysis?

A

It serves as a tool for organizations to objectively evaluate their cybersecurity capabilities and prioritize investments in security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What processes are involved in gap analysis?

A

Assessing existing controls against best practices and regulatory requirements, resulting in a report of deficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the expected outcome from a gap analysis?

A

The expected outcome is that recommendations for remediation are provided which will guide the organization on how to enhance their security posture effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Access Control?

A

Ensures that information systems align with the goals of the CIA triad, protecting sensitive data from unauthorized access.

20
Q

What are the key processes involved in Access Control?

A
  • Identification
  • Authentication
  • Authorization
  • Accounting
21
Q

In Access Control, what is the purpose of Identification?

A

Involves creating unique identifiers for users, devices, or processes to establish a baseline for access.

22
Q

In Access Control, what is the purpose of Authentication?

A

Verifies the identity of users through credentials such as passwords or digital certificates.

23
Q

In Access Control, what is the purpose of Authorization?

A

Determines and enforces access rights based on established models. (ex. Discretionary, Mandatory)

24
Q

In Access Control, what is the purpose of Accounting?

A

Involves tracking and monitoring authorized usage, alerting on any unauthorized access attempts.

25
Q

What are the categories of security controls?

A
  • Managerial Controls
  • Operational Controls
  • Technical Controls
  • Physical Controls
26
Q

In Security Controls, what is the purpose of the Managerial Controls?
Provide an example

A

Focus on oversight and risk management. (ex. Risk Assessments)

27
Q

In Security Controls, what is the purpose of the Operational Controls?
Provide an example

A

Primarily implemented by personnel. (ex. Training programs, Security Guards)

28
Q

In Security Controls, what is the purpose of the Technical Controls?
Provide an example

A

Enforced through technology. (ex. Firewalls, Antivirus Software)

29
Q

In Security Controls, what is the purpose of the Physical Controls?
Provide an example

A

Protect physical assets. (ex. Locks, Alarms)

30
Q

What are the functional types of security controls?

A
  • Preventive Controls
  • Detective Controls
  • Corrective Controls
  • Directive Controls
  • Deterrent Controls
  • Compensating Controls
31
Q

For Security Control Functions, what is the purpose of the Preventive Controls?
Provide an example

A

Aim to eliminate or reduce the likelihood of an attack. (ex. Firewalls, Antimalware)

32
Q

For Security Control Functions, what is the purpose of the Detective Controls?
Provide an example

A

Identify and record intrusions during an attack. (ex. Intrusion Detection Systems)

33
Q

For Security Control Functions, what is the purpose of the Corrective Controls?
Provide an example

A

Mitigate the impact of security breaches after they occur. (ex. Backup Systems)

34
Q

For Security Control Functions, what is the purpose of the Directive Controls?
Provide an example

A

Establish rules of behavior. (ex. Security Policies)

35
Q

For Security Control Functions, what is the purpose of the Deterrent Controls?
Provide an example

A

Discourage potential intrusions. (ex. Warning Signs)

36
Q

For Security Control Functions, what is the purpose of the Compensating Controls?
Provide an example

A

Provide alternative methods to achieve security objectives when primary controls are not feasible. (ex. Backup Generator)

37
Q

What role is the CIO?

A

Chief Information Officer

38
Q

Who is the Chief Information Officer (CIO)?

A

Holds overall responsibility for IT and security strategy within the organization.

39
Q

What role is the CSO?

A

Chief Security Officer

40
Q

What role is the CISO?

A

Chief Information Security Officer

41
Q

What are the responsibilities of the Chief Security Officer (CSO) / Chief Information Security Officer (CISO)?

A

Manages dedicated security departments and oversees security initiatives.

42
Q

What role do Managers play in information security?

A

Responsible for specific domains, ensuring compliance with security policies in their areas.

43
Q

What is a Security Operations Center (SOC)?

A

Monitors and protects critical information assets, providing real-time threat detection and response.

44
Q

What is the purpose of DevSecOps?

A

Integrates security practices into software development and deployment processes, ensuring security is prioritized throughout the lifecycle.

45
Q

What is the function of incident response teams?

A

Handles security incidents and notifications, often organized into teams like CIRT, CSIRT, and CERT.

46
Q

Fill in the blank: Non-repudiation is vital in _______ contexts.