Section 2: Fundamentals Of Security Flashcards

1
Q

Definition

Informational Security

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition

Information Systems Security

A

Protecting the systems (e.g. computers, servers, network devices) that hold and process critical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Definition

What is the CIA Triad?

A
  • Confidentiality - Ensures information is accessible only to authorized personell
  • Integrity - Ensures data remains accurate and unaltered
  • Availability - Ensures information and resources are accessible when needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition

Non-Repudiation

A

Guarantees that an action or event cannot be denied by the involved parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition

CIANA Pentagon

A

An extension of the CIA triad with the addition of non-repudiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Definition

What are the Triple A’s of security?

A
  • Authentication - verifying the identity of a user or system
  • Authorization - Determining actions or resources an authenticated user can access
  • Accounting - Tracking user activities and resource usage for audit or billing purposes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Knowledge

What are the Security Control Categories?

A
  1. Technical
  2. Managerial
  3. Operational
  4. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Knowledge

What are the Security Control Types

A
  1. Preventative
  2. Deterrent
  3. Detective
  4. Corrective
  5. Compensating
  6. Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition

Zero Trust Model

A

Operates on the principle that no one should be trusted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Knowledge

What planes we use to achieve zero trust?

A
  • Control Plane - adaptive identity, threat scope reduction, policy driven access control, and secured zones
  • Data Plane - subject/system, policy engine, policy administrator, and establishing policy enforcement points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition

Threat

A

Anything that could cause harm, loss, damage, or compromise our information technology systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Knowledge

Threats can come from the following:

A
  1. Natural disasters
  2. Cyber attacks
  3. Data integrity breaches
  4. Disclosure of confidential information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition

Vulnerability

A

Any weakness in the system design or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Knowledge

Vulnerabilities can come from internal factors such as:

A
  1. Software bugs
  2. Misconfigured software
  3. Improperly protected network devices
  4. Missing security patches
  5. Lack of physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition

Risk Management

A

Finding different ways to minimize the likelihood of a negative outcome and acheive the desired outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition

Confidentiality

A
  • Refers to the protection of information from unauthorized access and disclosure
  • Ensures that private or sensitive information is not available or disclosed to unauthrorized individuals, entities, or processes.