Section 1 Flashcards

1
Q

Threat

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems

Ex.
Natural disasters
Cyber-attacks
Data integrity breaches
Disclosure of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

Any weakness in the system design or implementation

Ex.
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat and Vulnerability

A

Threat + Vulnerability = Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Refers to the protection of information from unauthorized access and disclosure
Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes

THINK ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption

A

Process of converting data into a code to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
Verifies the accuracy and trustworthiness of data over the entire lifecycle

THINK HASHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing

A

Process of converting data into a fixed-size value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Ensure that information, systems, and resources are accessible and operational when needed by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Redundancy

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-repudiation

A

Focused on providing undeniable proof in the world of digital transactions

THINK DIGITAL SIGNATURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signatures

A

Considered to be unique to each user who is operating within the digital domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

Security measure that ensures individuals or entities are who they claim to be during a communication or transaction

-Knowledge Factor
-Possession Factor
-Inherence Factor
-Action Factor
-Location Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multi-Factor Authentication System (MFA)

A

Security process that requires users to provide multiple methods of identification
to verify their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accounting

A

Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded

-Syslog Servers
-Network Analysis Tools
Security Information and Event Management Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization

A

Pertains to the permissions and privileges granted to users or entities after they have been authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Technical Controls

A

Technologies, hardware, and software mechanisms that are implemented
to manage and reduce risks

17
Q

Managerial Controls

A

Involve the strategic planning and governance side of security

18
Q

Operational Controls

A

Procedures and measures that are designed to protect data on a
day-to-day basis

19
Q

Physical Controls

A

Tangible, real-world measures taken to protect assets

20
Q

Preventive Controls

A

Proactive measures implemented to thwart potential security threats or
breaches

21
Q

Deterrent Controls

A

Discourage potential attackers by making the effort seem less appealing
or more challenging

22
Q

Detective Controls

A

Monitor and alert organizations to malicious activities as they occur or shortly thereafter

23
Q

Corrective Controls

A

Mitigate any potential damage and restore our systems to their normal
state

24
Q

Compensating Controls

A

Alternative measures that are implemented when primary security
controls are not feasible or effective

25
Q

Directive Controls

A

Often rooted in policy or documentation and set the standards for
behavior within an organization

26
Q

Gap Analysis

A

Process of evaluating the differences between an organization’s current performance and its desired performance

27
Q

Technical Gap Analysis

A

Identifying any areas where it falls short of the technical capabilities
required to fully utilize their security solutions

28
Q

Business Gap Analysis

A

Identifying any areas where they fall short of the capabilities required to
fully utilize cloud-based solutions

29
Q

Zero Trust

A

Zero Trust demands verification for every device, user, and transaction within the
network, regardless of its origin

30
Q

Control Plane

A

Refers to the overarching framework and set of components responsible
for defining, managing, and enforcing the policies related to user and
system access within an organization

31
Q

Adaptive Identity

A

Relies on real-time validation that takes into account the
user’s behavior, device, location, and more

32
Q

Threat Scope Reduction

A

Limits the users’ access to only what they need for their
work tasks because this reduces the network’s potential
attack surface

33
Q

Policy-Driven Access Control

A

Entails developing, managing, and enforcing user access
policies based on their roles and responsibilities

34
Q

Secured Zones

A

Isolated environments within a network that are designed
to house sensitive data

35
Q

Data Plane

A

Subject/System - Refers to the individual or entity attempting to gain access.
Policy Enforcement Point- Where the decision to grant or deny access is actually
executed