Principles of Network Security Design Flashcards

1
Q

What are the guidelines and rules set by an organization to protect its information and technology assets called?

A

Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What outlines the procedures and guidelines for managing and securing company data throughout its lifecycle called?

A

Data Handling Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the requirements for creating and managing passwords within an organization to ensure secure access to its systems and data called?

A

Password Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an agreement between two or more parties that outlines the appropriate use of access to a corporate network or the internet called?

A

Acceptable Use Policy (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What sets the rules for employees who want to use their own personal devices, like smartphones and laptops, for work purposes and covers security measures to protect company data accessible from these devices?

A

Bring your own device (BYOD) Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What document explains how an organization collects, uses, discloses, and manages both Intellectual Property (IP) and Personally Identifiable Information (PII), outlining the rights of individuals and compliance with data protection laws?

A

Privacy Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the principle of only giving access to the minimum amount of resources needed to do the job at that time?

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What design principle ensures the root problem is solved not just the symptoms, has people as the main focus of the design process, and focuses on system interactions as a whole not just individual parts?

A

Human-centered design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What design principle focuses on when a system does experience a failure, it should fail to a safe state and protects the integrity and confidentiality of data?

A

Fail-safe defaults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What design principle focuses on keeping things simple, using trusted components, and only having essential services and protocols?

A

Economy of Mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What design principle focuses on authentication at every request not just at login, and implements timeout of sessions, and locking accounts after a certain amount of failed attempts?

A

Complete Mediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What design principle focuses on the security being separate from the design, algorithm must be open and accessible, and security is not kept secret?

A

Open Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What design principle focuses on having multiple people required to complete a task, making it so that a single person can’t complete a task alone, therefore, unable to misuse permissions?

A

Separation of Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What design principle focuses on preventing unintentional information sharing, using separate devices, tools, applications, and resources for different users or activities whenever possible?

A

Least Common Mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What design principle focuses on security designed to be psychologically acceptable to its users, meaning that security is simple and easy to use and users understand the fundamentals of why certain security measures are being implemented?

A

Psychological Acceptability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What design principle focuses on distrust by default, requiring no local trust assumptions, multi-factor authentication, always requiring authentication, and encrypting data?

A

Zero-trust