Seccion 1 Flashcards

1
Q

What is the main goal of Information Security?

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Information Systems Security.

A

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the CIA Triad stand for?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Confidentiality in the context of the CIA Triad?

A

Ensures information is accessible only to authorized personnel (e.g., encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Integrity ensure?

A

Ensures data remains accurate and unaltered (e.g., checksums)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of Availability?

A

Ensures information and resources are accessible when needed (e.g., redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Non-Repudiation.

A

Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the CIANA Pentagon?

A

An extension of the CIA triad with the addition of non-repudiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the Triple A’s of Security.

A
  • Authentication
  • Authorization
  • Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between Authentication and Authorization?

A

Authentication verifies the identity of a user or system; Authorization determines actions or resources an authenticated user can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify the categories of Security Controls.

A
  • Technical
  • Managerial
  • Operational
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of Security Controls?

A
  • Preventative
  • Deterrent
  • Detective
  • Corrective
  • Compensating
  • Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Zero Trust Model?

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Control Plane in the Zero Trust Model include?

A
  • Adaptive identity
  • Threat scope reduction
  • Policy-driven access control
  • Secured zones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Threat in the context of cybersecurity.

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Vulnerability?

A

Any weakness in the system design or implementation

17
Q

Where do threats and vulnerabilities intersect?

A

That is where the risk to your enterprise systems and networks lies

18
Q

What is Risk Management?

A

Finding different ways to minimize the likelihood of an outcome and achieve the desired outcome

19
Q

What are the five basic methods to ensure Confidentiality?

A
  • Encryption
  • Access Controls
  • Data Masking
  • Physical Security Measures
  • Training and Awareness
20
Q

What does Integrity ensure?

A

Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual

21
Q

List the methods used to maintain Integrity.

A
  • Hashing
  • Digital Signatures
  • Checksums
  • Access Controls
  • Regular Audits
22
Q

What is the importance of Availability in cybersecurity?

A

Ensures that information, systems, and resources are accessible and operational when needed by authorized users

23
Q

Define Redundancy in the context of Availability.

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability

24
Q

What are the types of Redundancy to consider in system design?

A
  • Server Redundancy
  • Data Redundancy
  • Network Redundancy
  • Power Redundancy
25
Q

What is the role of Digital Signatures in Non-repudiation?

A

Provide undeniable proof in the world of digital transactions

26
Q

What are the five commonly used authentication methods?

A
  • Something you know (Knowledge Factor)
  • Something you have (Possession Factor)
  • Something you are (Inherence Factor)
  • Something you do (Action Factor)
  • Somewhere you are (Location Factor)
27
Q

What is Multi-Factor Authentication (MFA)?

A

Security process that requires users to provide multiple methods of identification to verify their identity

28
Q

What is the purpose of Accounting in security?

A

Ensures all user activities during a communication or transaction are properly tracked and recorded

29
Q

List the types of technologies used for Accounting.

A
  • Syslog Servers
  • Network Analysis Tools
  • Security Information and Event Management (SIEM) Systems
30
Q

What are the four broad categories of Security Controls?

A
  • Technical Controls
  • Managerial Controls
  • Operational Controls
  • Physical Controls
31
Q

What are the six basic types of Security Controls?

A
  • Preventive Controls
  • Deterrent Controls
  • Detective Controls
  • Corrective Controls
  • Compensating Controls
  • Directive Controls
32
Q

What is Gap Analysis?

A

Process of evaluating the differences between an organization’s current performance and its desired performance

33
Q

What are the two basic types of Gap Analysis?

A
  • Technical Gap Analysis
  • Business Gap Analysis
34
Q

What does the Plan of Action and Milestones (POA&M) outline?

A

Specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task

35
Q

What does the Control Plane encompass in Zero Trust architecture?

A
  • Adaptive Identity
  • Threat Scope Reduction
  • Policy-Driven Access Control
  • Secured Zones
36
Q

What is the role of the Policy Engine in the Control Plane?

A

Cross-references the access request with its predefined policies

37
Q

Define the Data Plane in Zero Trust architecture.

A

Consists of the subject/system and policy enforcement point where access decisions are executed