Section 1: Fundamentals of Security Flashcards

1
Q

Act of protecting data and information from unauthorized access, unlawful modification and disruptions, disclosure, and corruption, and destruction.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Act of protecting the systems that hold and process the critical data. i.e computer, server, network device, smartphone, etc.

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Comprises the three pillars of information security that experts use to identify and reduce vulnerabilities in security systems.

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensures that information is only accessible to those with the appropriate authorization

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensures that data remains accurate and unaltered unless modification is required.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensures that information and resources are accessible and functional when needed by authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Concept that ensures that a party cannot deny the authenticity of their actions in a digital transaction

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

three processes that make up a security framework for cybersecurity.

A

Authentication, Authorization and Accounting - AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of verifying the identity of a user or system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Determines what actions or resources a user can access.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Act of tracking user activities and resource usage, typically for audit or billing purposes.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data.a set of security measures that limit who can access an organization’s data and resources.

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

part of a network that controls how data packets are forwarded — meaning how data is sent from one place to another.

A

Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Also called the forwarding plane and it forwards the packets. Is more like the cars that drive on the roads, stop at the intersections, and obey the stoplights.

A

Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anything that could cause harm, loss, damage, or compromise to information technology systems. Come from external sources.

17
Q

Any weakness in the system design or implementation. They come from internal factors, such as software bugs, misconfigured software, improperly protected network devices, missing security patches, lack of physical security. These are within our control.

A

Vulnerabiliy

18
Q

Finding different ways to minimize the likelihood of an outcome occurring and achieve the desired outcomes.

A

Risk Management

19
Q

Refers to the protection of information from unauthorized access and disclosure.

A

Confidentiality

20
Q

What are the 5 methods to ensure confidentiality

A

Encryption, Access Control, Data Masking, Physical Security, and. Training Awareness.

21
Q

This concept is important to achieve because of 3 main reasons; protect personal privacy, maintain a business advantage, and achieve regulatory compliance.

A

Confidentiality

22
Q

Concept which is important for ensuring data accuracy, maintain trust, and ensure system operability.

23
Q

Number one way that your are going to see the maintenance of integrity for all the data, software, and networks.

24
Q

Process of converting data into fixed-sized value. Resulting of a fixed-length string of bits called hash digest.

25
Method to verify the integrity of data sent during a transmission.
Checksums
26
Ensures that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations.
Access Controls
27
Reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.
Regular audits
28
Duplication of critical components or functions of a system with intention of enhancing its reliability. For example, having a spare tire in your car in case the one you have gets puncture.
Redundancy
29
4 types of redundancy.
Server, Data, Network and power.
30
Redundancy type. Involves using multiple servers in a load balance so that if one fails, the other servers can take over the load to continue supporting end users.
Server Redundancy
31
Redundancy type. Involves storing data in multiple places.
Data Redundancy
32
Redundancy type. Ensures that if one network path fails, the data can travel through another route.
Network Redundancy
33
Redundancy type. Involves using backup power sources to ensure that an organization's systems remain operational during periods of power disruption or outages within a local service area.
Power Redundancy
34
A mathematical protocol that uses cryptographic techniques to verify the authenticity and integrity of digital messages or documents.
Digital Signature
35
What are the five commonly known authentication methods.
Something you know, have, are, do and somewhere you are.
36