Section 2 Flashcards

1
Q

What is Information Security?

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information Systems Security?

A

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the CIA Triad stand for?

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Confidentiality in the CIA Triad?

A

Ensures information is accessible only to authorized personnel (e.g., encryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Integrity ensure in the CIA Triad?

A

Ensures data remains accurate and unaltered (e.g., checksums).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Availability in the CIA Triad?

A

Ensures information and resources are accessible when needed (e.g., redundancy measures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Non-Repudiation?

A

Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the CIANA Pentagon?

A

An extension of the CIA triad with the addition of non-repudiation and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Triple A’s of Security?

A
  • Authentication
  • Authorization
  • Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of Authentication?

A

Verifying the identity of a user or system (e.g., password checks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Authorization determine?

A

Determining actions or resources an authenticated user can access (e.g., permissions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Accounting in security?

A

Tracking user activities and resource usage, usually for audit or billing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the categories of Security Control?

A
  • Technical
  • Managerial
  • Operational
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the types of Security Control?

A
  • Preventative
  • Deterrent
  • Detective
  • Corrective
  • Compensating
  • Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Preventative Security Control?

A

Proactive measures used to prevent potential security threats and breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Deterrent Security Control?

A

Discourage potential attackers by making the effort seem less appealing or more challenging (e.g., no entry sign, warning banner on website)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Detective Security Control?

A

Monitor and alert organizations to malicious activities as they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Corrective Security Control?

A

Mitigates any potential damage and restores systems to their normal state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Compensating Security Control?

A

Alternative measures that are implemented when primary security controls are not feasible or effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Directive Security Control?

A

Guide, inform, or mandate actions. (e.g., policy or documentation, set standards for behaviour within an org.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the Zero Trust Model operate on?

A

The principle that no one should be trusted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the components of the Control Plane in Zero Trust?

A
  • Adaptive identity
  • Threat scope reduction
  • Policy-driven access control
  • Secured zones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In Zero Trust architecture, what is a Control Plane?

A

Framework responsible for managing and enforcing policies related to user and system access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In the context of a Control Plane, what is Adaptive Identity?

A

Real-time validation that takes into account the user’s behaviour, device, location, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In the context of a Control Plane, what is Threat Scope Reduction?

A

Limits user access to only what they need for their work tasks to reduce the network’s potential attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In the context of a Control Plane, what is Policy-Driven Access Control?

A

Entails developing, managing, and enforcing user access policies based on their roles and responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In the context of a Control Plane, what is a Secured Zone?

A

Isolated environments within a network that are designed to house sensitive data. Requires Authorization to access.

28
Q

What does the Data Plane consist of in Zero Trust?

A
  • Subject/system
  • Policy enforcement points
29
Q

What is the Subject/System in the context of the Data Plane?

A

Refers to the individual/entity attempting to gain access

30
Q

What is a Policy Enforcement Point?

A

A point where the decision to grant/deny access is actually executed.

31
Q

Define Threat.

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems.

32
Q

What are common sources of Threats?

A
  • Natural disasters
  • Cyber-attacks
  • Data integrity breaches
33
Q

Define Vulnerability.

A

Any weakness in the system design or implementation.

34
Q

What are some internal factors that can lead to Vulnerabilities?

A
  • Software bugs
  • Misconfigured software
  • Improperly protected network devices
  • Missing security patches
  • Lack of physical security
35
Q

Where do threats and vulnerabilities intersect?

A

That is where the risk to your enterprise systems and networks lies.

36
Q

What is Risk Management?

A

Finding different ways to minimize the likelihood of an undesired outcome and achieve the desired outcome.

37
Q

What is Confidentiality?

A

Refers to the protection of information from unauthorized access and disclosure.

38
Q

Why is Confidentiality important?

A
  • To protect personal privacy
  • To maintain a business advantage
  • To achieve regulatory compliance
39
Q

What are the five methods to ensure Confidentiality?

A
  • Encryption
  • Access Controls
  • Data Masking
  • Physical Security Measures
  • Training and Awareness
40
Q

Why is Integrity important?

A
  • To ensure data accuracy
  • To maintain trust
  • To ensure system operability
41
Q

What are the five methods to maintain Integrity?

A
  • Hashing
  • Digital Signatures
  • Checksums
  • Access Controls
  • Regular Audits
42
Q

What does Availability ensure?

A

Ensures that information, systems, and resources are accessible and operational when needed by authorized users.

43
Q

Why is Availability valued in cybersecurity?

A
  • Ensuring Business Continuity
  • Maintaining Customer Trust
  • Upholding an Organization’s Reputation
44
Q

What is Redundancy in system design?

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability.

45
Q

What are the types of Redundancy to consider?

A
  • Server Redundancy
  • Data Redundancy
  • Network Redundancy
  • Power Redundancy
46
Q

What is Non-repudiation focused on?

A

Providing undeniable proof in the world of digital transactions.

47
Q

What do Digital Signatures ensure?

A

They ensure both integrity and authenticity.

48
Q

How is a Digital Signature created?

A

By hashing a message and encrypting that hash digest with the user’s private key using asymmetric encryption.

49
Q

(Confidentiality) What is Encryption?

A

Process of converting data into a code to prevent unauthorized access.

Encryption is essential for protecting sensitive information from unauthorized users.

50
Q

(Confidentiality) What are Access Controls?

A

Setting up strong user permissions to ensure that only authorized personnel can access certain types of data.

Access controls are critical for maintaining data security.

51
Q

(Confidentiality) What is Data Masking?

A

Method that involves obscuring specific data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users.

Data masking is commonly used in environments where real data cannot be exposed.

52
Q

(Confidentiality) What do Physical Security Measures ensure?

A

Confidentiality for both physical and digital information.

Physical security includes measures for protecting paper records and digital information on servers and workstations.

53
Q

(Confidentiality) What is the purpose of Training and Awareness in security?

A

To conduct regular training on security awareness best practices for employees to protect sensitive data.

Employee training is a crucial component of an organization’s security strategy.

54
Q

What is server redundancy?

A

Using multiple servers in a load balanced or failover configuration to support end users if one server fails or is overloaded

Server redundancy helps maintain service availability.

55
Q

What does data redundancy involve?

A

Storing data in multiple places

Data redundancy enhances data availability and protects against data loss.

56
Q

What is network redundancy?

A

Ensuring that if one network path fails, the data can travel through another route

Network redundancy improves network reliability.

57
Q

What is power redundancy?

A

Using backup power sources, like generators and UPS systems

Power redundancy is crucial for maintaining operations during power outages.

58
Q

What is the Knowledge Factor in authentication methods? (Something you know)

A

Relies on information that a user can recall

This method typically involves passwords or PINs.

59
Q

What does the Possession Factor entail in authentication? (Something you have)

A

Relies on the user presenting a physical item to authenticate themselves

Examples include smart cards or mobile devices.

60
Q

Define the Inherence Factor in authentication methods. (Something you are)

A

Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be

This can include fingerprints or facial recognition.

61
Q

What is the Action Factor in authentication? (Something you do)

A

Relies on the user conducting a unique action to prove who they are

Examples include gesture-based authentication or keystroke dynamics.

62
Q

Explain the Location Factor in authentication methods. (Somewhere you are)

A

Relies on the user being in a certain geographic location before access is granted

This can utilize GPS data or IP address verification.

63
Q

What are Technical Controls?

A

Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks

64
Q

What are Managerial Controls?

A

Strategic planning and governance side of security; also referred to as administrative controls

65
Q

What are Operational Controls?

A

Procedures and measures designed to protect data on a day-to-day basis; governed by internal processes and human actions

66
Q

What are Physical Controls?

A

Tangible, real-world measures taken to protect assets