Mastering Security Basics Flashcards

1
Q

What is CIA triad?

A

CIA triad stands for Confidentiality, Integrity, and Availability. It’s a fundamental concept in information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Confidentiality

A

Confidentiality ensures that information is only accessible to those who are authorized to view it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Integrity.

A

Integrity ensures that data remains accurate, complete, and unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Availability.

A

Availability ensures that information and resources are accessible and usable when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Risk Management?

A

Risk Management is the process of identifying, assessing, and prioritizing risks followed by the coordinated application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Vulnerability?

A

A vulnerability is a weakness that could be exploited by a threat to breach security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Threat?

A

A threat is any potential danger to information or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Exploit.

A

An exploit is a piece of software, a chunk of data, or a sequence of commands that take advantage of a bug, glitch, or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four security Categories?

A

Technical, Managerial, Operational, Physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe technical controls

A

Use of technology such as hardware, software, and firmware to reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Managerial controls.

A

Administrative documents or policies to enforce security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide some examples of technical controls.

A

Encryption, Antivirus software, intrusion detection system (IDSs) and intrusion prevention systems (IPSs), Firewalls, Least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of Managerial controls

A

Risk assessment, vulnerability assessments,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Operational security controls.

A

Ensure daily operations and compliance of an organizations security plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provide some examples of operational security controls

A

Patrols, personnel security, awareness and training, configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe physical security controls.

A

Physical security controls are physical objects or items to deter unauthorized personnel from areas of data

17
Q

Provide some examples of physical security controls.

A

Bollards or other barricades, access control vestibules, lighting, signs, fences, sensors, cameras.

18
Q

What are the 6 controls types?

A

Preventative, deterrent, detective, corrective, compensating, and directive.

19
Q

What are some examples of preventative control types?

A

Firewalls, software applications, Access control list(ACL), security guards, intrusion prevention systems (IPSs), Patch Managment, Antivirus or anti-malware software,

20
Q

What is a preventative control?

A

Use of policies to mitigate or stop security risk before they occur.

21
Q

What is a deterrent control type?

A

Discourage or deter an attacker from carrying out unauthorized activities.

22
Q

What are some examples of deterrent controls

A

Warning or Security signs, login banners,

23
Q

What is a detective security control?

A

Identifies security events or breaches when they have already occurred.

24
Q

What are some examples of detective controls?

A

Security information event management (SIEM), log monitoring,security audit, Video Surveillance (CCTV), intrusion detection system (IDSs)

25
Q

What is a corrective control?

A

Mitigates the impact of breaches or security events.

26
Q

What are some examples of corrective controls?

A

Incident response plan (IRP), software patching,

27
Q

What is a compensating control

A

Control that is Put in place as an alternative security method when existing ones no longer suffice.

28
Q

Provide some examples of compensating controls.

A

Virtual Private Network (VPN), Encryption, Multi-factor Authentication (MFA),

29
Q

Describe directive controls.

A

Security measure to establish clear rules and procedures on how to handle security events and incidents should they arise.

30
Q

Provide some examples of Directive controls.

A

Acceptable Use Policy (AUP), password policies, change management.