OSG-CH1 Flashcards

1
Q

prevent or minimize unauthorized access to data.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

protection prevents unauthorized alterations of data

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

functional and allows authorized users to gain authorized access

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disclosure, alteration, and destruction make up the DAD Triad

A

Failures of the CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Overprotecting confidentiality

A

result in a restriction of availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Overprotecting integrity

A

result in a restriction of availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Overproviding availability

A

result in a loss of confidentiality and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Providing pieces of information such as involve typing in a username; swiping a smartcard; waving a proximity device; speaking a phrase; or positioning your face, hand, or finger for a camera or scanning device

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

requires the subject to provide additional information that corresponds to the identity they are claiming

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Log files provide a trail for re-creating the history of an event, intrusion, or system failure. needed to detect malicious actions by subjects, attempted intrusions, and system failures and to reconstruct events, provide evidence for a prosecution, and produce problem reports and analysis

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is established by linking an individual to the activities of an online identity through the security services and mechanisms of auditing, authorization, authentication

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

use of multiple controls in a series. No one control can protect against all possible threats.

A

Defense in depth (layering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used for efficiency. Similar elements are put into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective. the concept is used when classifying objects or assigning roles to subjects.

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Type of Steganography; ensures that data existing at one level of security is not visible to processes running at different security levels. positioning data so that it is not viewable or accessible to an unauthorized subject.

A

Data hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

exists between a high-security area and a low-security one, such as between a LAN and the internet.

A

security boundary

17
Q

compare the security processes and infrastructure used within the organization with knowledge and insight obtained from external sources; imposed on organizations due to legislative and regulatory compliance needs.

A

Security governance

18
Q
A

Third-party governance

19
Q
A

Documentation review