Sec+ Chapter 01: Today's Security Professional Flashcards

1
Q

CIA triad

A

Confidentiality: Disallow unauthorized people from accessing sensitive info

Integrity: No unauthorized modification

Availability: Info and systems are ready to meet the needs of legit users when they need them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security incident

A

When an org experiences a breach in one or more of the CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DAD triad

A

Disclosure: Inverse confidentiality

Alteration: Inverse Integrity

Denial: Inverse availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Financial risk

A

Risk of monetary damage to the org as a result of a data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reputational risk

A

Negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Strategic risk

A

The risk that an org will not be able to carry out its business plans as a result of a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operational risk

A

Risk to an org’s ability to carry out day to day functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Compliance risk

A

When a breach causes an org to run afoul of legal or regulatory requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control objectives

A

Statements written by an org about their desired state of security, but don’t actually carry out security activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security controls

A

Specific measures that fulfill the security objectives of an org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technical controls

A

Our own tech systems to prevent security events

EX: Firewall rules, access control list (ACL), IPS, encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operational controls

A

Controls managed by people

EX: Security guards, awareness programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Managerial controls

A

Focuses on the design of security or policy implementation associated with the security

EX: Periodic risk assessments, security planning exercises, incorporation of security into the org, standard operating procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Preventive controls

A

Prevents access to a particular area

EX: Firewalls, door lock, security guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Detective controls

A

Identify and record security events that have already happened

EX: IDS, motion detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Corrective controls

A

Mitigate damage that occurred from security events

EX: Restoring backups after ransomware attack, IPS blocking an attacker

17
Q

Deterrent controls

A

May not stop an intrusion, but deters someone from violating security policies

EX: Guard dogs, barbed wire, login banner with warning

18
Q

Physical controls

A

Security controls that impact the physical world

EX: Locks, fire suppression, fences, perimeter lights, alarms

19
Q

Compensating controls

A

Mitigate the risk associated with exceptions made to a security policy

EX: Can’t sunset a legacy system, so compensating controls placed on it to isolate from network

20
Q

Data at rest

A

Stored data that resides on HD, tapes, cloud, or storage media

21
Q

Data in motion

A

Data in transit over a network

22
Q

Data in processing

A

Data actively in use by a computer