S2 - FUNDAMENTOS Flashcards

1
Q

Diferença entre Information Security e Information System Security

A

Information data = protecting the DATA / Information Systems Security = DEVICES that hold the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whats the difference betwen Threat and Vulerability? Talk about risk management

A

Threat is an external factor and vulnerability is internal. You have control over vulnerabilities. The Intersection betwen these is where the risk is. Our job is to avoid this intersection and midigate the damage in case it happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality is linked with ____________ ? Explain

A

Encryption. Confientiality is to proct data from unauthorized users, encyption is the most common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity is linked with ___________ ? Explain

A

Hashing. Integrity is the trust that the file or data hasn’t been modified or corrupted, hash is a value attributed to the file that changes based on the content. Integrity reminds trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability is linked with ___________ ? Explain

A

Redundancy, the “backup” network, server, data, power supply. All those factors ensure that the system stays available for the most time possible. Anti falhas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Non-repudiation and how we can secure it

A

Non-repudiation is the undeniable proof in digital transactions, like a SIGNATURE. To ensure this on the digital world we can use a DIGITAL SIGNATURE, wich also ensure the INTEGRITY using hash with a signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Authentication and its importance

A

Authentication is the way that we verify that the user is who him claim to be. Like username and password, 2FA, MFA and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Authorization, and the diference betwen authentication

A

Authorization is how the system let you do what you can do with your role. It dictates, based on AUTHENTICATION what you can and cant do on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accountability: What is and why is it important

A

Accountability is LOGGING EVERYTHING. So you can analyse the system in a case of a flaw or if you are trying to increase the performance in some way. It also prevents users doing wrong things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are four security control categories. Name at least 3

A

Techical (firewall, antivirus, etc), Managerial (strategic planning and governance side of sec), Operational (change pw each 90 days, curso pra usuarios) and Physical (guardds, and physcal sec in server, datacenter, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wich type of controls do we have?

A

Preventive, Deterrent (placa), Detective, Corrective, Compensating, Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Gap Analysis

A

Gap analysis é a analise do gap entre uma tecnologia ou implementação que voce quer fazer com o que vc tem atualmente.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Zero Trust

A

Zero trust is a cybersec approach that assumes that no one is trusted by default, no matter the location. Requires cotinuous verificaction to access and operate on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly