Section 2 - ISC2 Flashcards
Confidentiality, Integrity and Availability are referred to as
the CIA Triad
PII Stands for
PHI Stands for
Personal Identifiable Information
Protected Health Information
What is the measure of the importance assigned to information by its owner
Sensitivity
What term is Availability typically associated with
Criticality
What is the process called of verifying or providing the users identification is know as
Authentication
Name 3 Common methods of Authentication
Something you know - passwords or phrases (Knowledge Base)
Something you have - Token, cards (Token-Base)
Something you are - Biometrics (Characteristics Base)
True or False - Best practice is to use all 3 of the common methods of communication
False - 2 at least two is recommended
Name the legal term as defined as the protection against an individual falsely denying having performed a particular action
Non-repudiation
Name 3 Risk Management Terminology and their definitions
Asset - something that needs protection
Vulnerability - is a gap or weakness
Threat - something or someone that aims to exploit a vulnerability
Name Threat Actors
Insiders
Outside Individuals
Formal Entities
Nation States
Technology such as bots
Threat Vector is
the approach and technique
The magnitude of the harm that can be expected and can result in a chain reaction is called
Impact
Name the 4 Risk Treatments
Avoidance - exit the service due to high risks
Acceptance - risk averse or low likelihood
Mitigation - Most common taking steps to minimize
Transfer - insurance for eg
Name the 3 Security Controls
Physical Controls
Administrator Controls
Technical Controls (logical controls)
What is the detailed steps to complete a task that supports departmental or organizational policies
Procedure
Used by governance teams to provide a framework to introduce policies and procedures in support of regulations
Standard
Put in place by organizational governance such as executive management to provide guidance
Policies
in form of laws typically from government and can carry financial penalties
Regulations
Name the Code of Ethics Cannons
Protect Society, the common good, necessary public trust and confidence in the infrastructure
Act honorably, honestly, justly, responsibility and legally
Provide diligent and competent services to principles
Advance and protect the profession
The process and act of converting the message from plaintext to ciphertext sometimes referred to as enciphering
Encyrption
The process of how an organization is managed, usually includes all aspects of how decisions are made for that organization, such as policies, roles and procedures
Governance
Define Likelihood of Occurrence
based on a weighted factor on subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability
What Department is NIST part of?
US Dept. of Commerce
Qualitative Risk vs Quantitative Risk Analysis
Qualitative - assignment based on low, medium and high
Quantitative - numerical values are assigned to both impact and likelihood based on stats and monetized
Is BCP an Incident Response Plan
Yes
Name the Components of an Incident Response Plan
Preparation - policy, identify critical data, train staff on response, ERT, Roles and responsibilities, Communication between stakeholders
Detection and Analysis - monitor attack vectors, Analyze incidents, prioritize, standard incident docs
Containment , Eradication and Recovery
Post Incident Activity - identify evidence, document lessons learned
T or F Business Continuity is to bring all systems fully operational
Fales - just critical systems
What is the nickname of the book of procedures for BCP
RedBook
True or False DR starts where BC leaves off
True
What part of the CIA Triad is Incident Response, Business Continuity and Disaster Recovery
Availablity
What is the mitigations of violations of security policies and recommended practices
Incident Handling/Incident Response
Is a Firewall considered a Security Control
Yes
for Access Controls Subjects constitute the following
User, a process, a procedure, client or server, program, workstations,
What is the term for anything that the subject is trying to access referred to
Objects
Note: Objects are passive and do not contain their own access control logic and need to be protected
What is the term for an instruction developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list
Rule
What are the implementations of access control and are part of a _________ strategy
Layered Defense also know as defense in depth