Section 1 Flashcards

1
Q

Threat

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems

Ex.
Natural disasters
Cyber-attacks
Data integrity breaches
Disclosure of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

Any weakness in the system design or implementation

Ex.
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat and Vulnerability

A

Threat + Vulnerability = Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Refers to the protection of information from unauthorized access and disclosure
Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes

THINK ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption

A

Process of converting data into a code to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
Verifies the accuracy and trustworthiness of data over the entire lifecycle

THINK HASHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing

A

Process of converting data into a fixed-size value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Ensure that information, systems, and resources are accessible and operational when needed by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Redundancy

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-repudiation

A

Focused on providing undeniable proof in the world of digital transactions

THINK DIGITAL SIGNATURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signatures

A

Considered to be unique to each user who is operating within the digital domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

Security measure that ensures individuals or entities are who they claim to be during a communication or transaction

-Knowledge Factor
-Possession Factor
-Inherence Factor
-Action Factor
-Location Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multi-Factor Authentication System (MFA)

A

Security process that requires users to provide multiple methods of identification
to verify their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accounting

A

Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded

-Syslog Servers
-Network Analysis Tools
Security Information and Event Management Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization

A

Pertains to the permissions and privileges granted to users or entities after they have been authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Technical Controls

A

Technologies, hardware, and software mechanisms that are implemented
to manage and reduce risks

17
Q

Managerial Controls

A

Involve the strategic planning and governance side of security

18
Q

Operational Controls

A

Procedures and measures that are designed to protect data on a
day-to-day basis

19
Q

Physical Controls

A

Tangible, real-world measures taken to protect assets

20
Q

Preventive Controls

A

Proactive measures implemented to thwart potential security threats or
breaches

21
Q

Deterrent Controls

A

Discourage potential attackers by making the effort seem less appealing
or more challenging

22
Q

Detective Controls

A

Monitor and alert organizations to malicious activities as they occur or shortly thereafter

23
Q

Corrective Controls

A

Mitigate any potential damage and restore our systems to their normal
state

24
Q

Compensating Controls

A

Alternative measures that are implemented when primary security
controls are not feasible or effective

25
Directive Controls
Often rooted in policy or documentation and set the standards for behavior within an organization
26
Gap Analysis
Process of evaluating the differences between an organization's current performance and its desired performance
27
Technical Gap Analysis
Identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions
28
Business Gap Analysis
Identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions
29
Zero Trust
Zero Trust demands verification for every device, user, and transaction within the network, regardless of its origin
30
Control Plane
Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization
31
Adaptive Identity
Relies on real-time validation that takes into account the user's behavior, device, location, and more
32
Threat Scope Reduction
Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface
33
Policy-Driven Access Control
Entails developing, managing, and enforcing user access policies based on their roles and responsibilities
34
Secured Zones
Isolated environments within a network that are designed to house sensitive data
35
Data Plane
Subject/System - Refers to the individual or entity attempting to gain access. Policy Enforcement Point- Where the decision to grant or deny access is actually executed