Section 1: Understanding Security Fundamentals Flashcards
What are the three components of the CIA triad?
Confidentiality (where the data is encrypted)
Integrity (where the data uses hashing)
Availability (where the data is available, for example, by restoring data from a backup)
Why might an inactive CCTV camera be placed on the outside wall of a building?
An inactive CCTV camera could be used as a deterrent since criminals would not know that it is inactive.
What does confidentiality mean?
Preventing other people from viewing the data; the best way to keep data confidential is to encrypt it.
How can you control access of personnel to a data center?
Install a mantrap.
What is the purpose of an air gap?
Prevent data theft by removing physical connections between the device and network. The only way to remove data from an air-gapped machine is with removable media like a USB drive.
Name three main control categories.
Managerial, Operational, Technical
Name three physical controls.
Lighting
Cameras
Robot sentries
Fences
Gate signage
Industrial camouflage
Security guards
Badges
Key management
Proximity card
Tokens
Biometric locks
Electronic locks
Burglar alarms
Smoke detectors
Internal protection
Conduits
HVAC
Cable locks
Airgap
Laptop safe
USB data blocker
Vault
Faraday cage
Following an incident, what type of control will be used when researching how the incident happened?
Detective controls, wherein all evidence is gathered and analyzed.
How do you know whether the integrity of your data is intact?
Hashing provides data integrity; the hash value is measured before and after accessing data. If the values match, it has integrity.
What is a corrective control?
The actions you take to recover from an incident. You may have to restore data from a backup.
What type of control is it when you change the firewall rules?
Technical control.
What is used to log in to a system that works in conjunction with a PIN?
Smart card
CAC card
PIV card
What is the name of the person who looks after classified data? Who gives people access to the classified data?
The custodian stores and manages the data. The administrator grants access to the data.
When you use a DAC model for access, who determines who gains access to the data?
The data owner decides who has access to the data.
What is least privilege?
The process of giving an employee minimal permissions to perform their jobs.