Objective 1.2 Flashcards

Summarize fundamentals security concepts

1
Q

Confidentiality

A

Ensures that information is only accessible to those with the appropriate authorization. (Ex: exncryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA Triad

A

C - Confidentiality
I - Integrity
A - Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Ensures the data remains accurate and unaltered unless modification is required. (Ex: checksums, hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Ensures that information resources are accessible and functional when needed by authorized users. (ex: website up and running all the time regardless the traffic it’s receiving.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-repudiation

A

Guaranteeing that specific action or event has taken place and cannot be denied by the parties involved. (Ex: A digitally signed email. That’s going to ensure that I cannot deny sending you that particular message because my digital signature is attached to it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

New to CIANA Triad making it a pentagon

A

CIA
N - Non-repudiation
A - Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAA

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

Process of verifying the identity of a user or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization

A

Defines what actions or resources a user can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accounting

A

Act of tracking user activities and resources usage, typically for audit or billing purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Controls

A

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Controls Categories

A

Technical
Managerial
Operational
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Security Controls

A

Preventative
Deterrent
Detective
Corrective
Compensating
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero Trust

A

Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ZeroTrust: Control Plane

A

Consists of adaptative identity, threat scope reduction, policy-driven access control, and secured zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ZeroTrust: Data Plane

A

Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Confidentiality importance

A
  1. Protect personal privacy
  2. Maintaint a business advantage
  3. Achieve a regulatory compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 methods to achieve CONFIDENTIALITY

A
  1. Encryption
  2. Access Control
  3. Data Masking
  4. Physical Secutiry Measures
  5. Training and Awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Access Controls

A

Ensure only authorized personnel can access certain types of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Encryption

A

Process of converting data into code to prevent unathorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data Masking

A

Method that involves obscuring data within a database to make it inacessible for unauthorized users while retaining the real data’s authencity and use for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Physical Security Measures

A

Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Training and Awareness

A

Conduct regular training on the security awareness best practices that employees can use to protect the organization’s sesitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

most important thing linked to Confidentiality

A

ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Integrity importance

A
  1. Ensure DATA ACCURACY
  2. Maintain TRUST
  3. Maintain SYSTEM OPERABILITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

5 methods to achieve INTEGRITY

A
  1. Hashing
  2. Digital Signatures
  3. Checksums
  4. Access Controls
  5. Regular Audits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Hashing

A

Process of converting data into fixed-size value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

most important thing linked to Integrity

A

HASHING

29
Q

[Hashing] The result of hashing function is called…

A

Hash Digest

30
Q

[Hashing] The Hash Digest will almost serve like a…

A

Digital Fingerprint

31
Q

Digital Signatures

A

Use encryption to ensure integrity and authencity.

32
Q

[Digital Sign.] How is the process of digitally sign a file?

A
  1. Hash the file (Integrity)
  2. Hash Digest is Encrypted using users private key (Authencity)

Now this data is digitally signed and any alterations in the file will drastically change the file’s hash, wich in turn, would invalidate that digital signature.

33
Q

Checksums

A

Method to verify the integrity of data during transmission

34
Q

Access Controls

A

Ensure that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations.

35
Q

Regular Audits

A

Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.

36
Q

Availability importance

A
  1. Ensure business continuity.
  2. Maintaining customer trust.
  3. Upholding an organization’s reputation.
37
Q

most important thing linked to Availability

A

REDUNDANCY

38
Q

4 methods to achieve AVAILABILITY

A
  1. Server Redundancy
  2. Data Redundancy
  3. Network Redundancy
  4. Power Redundancy
39
Q

Server Redundancy

A

Involves using multiple servers in a load balancer so that if one is overloaded or fails, the other servers can take over the load to continue supporting end users.

40
Q

Data Redundancy

A

Involves storing data in multiple places.

41
Q

Network Redundancy

A

Ensures if one network path fails, the data can travel through another route.

42
Q

Power Redundancy

A

Involves using backup power sources – like generations and uninterrupted powersupplies – to ensure that an organization’s systems remain operational during periods of power disruption or outages within a local service area.

43
Q

Non-repudiation importance

A
  1. Confirming authenticity of digital transactions.
  2. Ensuring integrity.
  3. Providing accountability.
44
Q

most important thing linked to Non-repudiation

A

DIGITAL SIGNATURES

45
Q

Authentication methods

A
  1. smth you know
  2. smth you have
  3. smth you are
  4. smth yo do
  5. swh you are
46
Q

Relies on information that a user can recall.

A

Smth you know (Knowledge Factor)

47
Q

Relies on the user presenting a physical item to autheticate themselves.

A

Smth you have (Possession Factor)

48
Q

Relies on the user providing a unique physical or behaviorial characteristic of the person to validate that they are who they claim to be.

A

Smth you are (Inherence Factor)

49
Q

Relies on the user conducting a unique action to prove who they are.

A

Smth you do (Action Factor)

50
Q

Relies on the user being in the certain geographic location before access is granted.

A

Swh you are (Location Factor)

51
Q

2 autentication methods.

A

2FA - Two Factor Authentication

52
Q

2 or more autentication methods.

A

MFA - Multi Factor Authentication

53
Q

Importance of Authentication

A
  1. Prevent unauthorized access.
  2. Protect user data privacy.
  3. Ensure resource validity.
54
Q

most important thing linked to Authentication

A

MFA - Multi Factor Authentication

55
Q

Knowledge Factor

A

Smth you know
Ex: login and password.

56
Q

Possession Factor

A

Smth you have
Ex: OTP (One Time Password)

57
Q

Inherence Factor

A

Smth you are
Ex: Iris or fingerprint.

58
Q

Action Factor

A

Smth you do
Ex: handwriten samples.

59
Q

Location Factor

A

Swh you are
Ex: Just open the door if you are within 20meters.

60
Q

Which are the types of Authorization mechanisms controls?

A
  • role-based
  • rule-based
  • attribute-based
61
Q

Importance of Authorization

A
  1. Protect sesitive data
  2. Maintain system integrity in organizations
  3. Create more streamlined user experiences
62
Q

Importance of ACCOUNTING

A
  1. Logging into the system
  2. Accessing files
  3. Modifying configuration settings
  4. Downloading or installing software
  5. Attempting unauthorized actions on systems and networks
63
Q

5 things to a robust audit system

A
  1. Audit Trail
  2. Regulatory Compliance
  3. Forensic Analysis
  4. Resource Optimization
  5. User Accountability
64
Q

[Accounting] Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a specific user or point in time.

A

Audit Trail

65
Q

[Accounting] Maintains a comprehensive record of all the users’ activities.

A

Regulatory Compliance

66
Q

[Accounting] Uses detailed accounting and event logs that can help cybersecurity experts understand what happened , how it happened, and how to prevent similar incidents from ocurring again in the future.

A

Forensic Analysis

67
Q

[Accounting] Organization can ……….. system performance and minimize costs by tracking ……….. utilization and allocation decisions.

A

Resource Optimization

68
Q

[Accounting] Thorough accounting system ensures users’ actions are monitored and logged, deterring potential misuse and promoting adherence to the organization’s policies.

A

User Accountability

69
Q

Tools related to Accountability

A
  • Syslog servers
  • Network analysis tools
  • SIEMs (Security Information and Event Management systems)