Secton 2 | Fundamentals of Security Flashcards

OBJECTIVE 1.1 - 1.2

1
Q

Information Security

Protecting the data.

A

Act of protecting data and information from unauthorized access, unlawful modification and distruption, disclosure, and corruption, and destruction.

Devices that hold the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Act of protecting the systems that hold and process the critical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

Encryption

Refers to the protection of information from unauthorized access and disclosure.

A

Ensures that information is only accessible to those with the appropriate authorization.

Protect personal privacy, Maintain a business advantage, Achieve regulatory compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encrpytion

A

Process of converting data into code to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Masking

A

Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical Security Measures

A

Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Training and Awareness

A

Conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

Hashing

Integrity verifies the accuracy and trustworthiness of data over the entire lifecycle.

A

Ensures that data remains accurate and unaltered unless modification is required.

Ensure Data Accuracy, Maintain Trust, Ensure System Operability.

Maintaining data integrity ensures that decisions are made based on correct information and with the expected outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing

A

Process of converting data into a fixed-size value

Hash Digest, Digital fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Signatures

A

Use encryption to ensure integrity and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Checksums

A

Method to verify the integrity of data during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Controls

A

Ensures that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Regular Audits

A

Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Availability

Making sure that services, systems, and data are always available when they’re supposed to be.

A

Ensures that information and resources are accessible and functional when needed by authorized users.

99.9 % (3 Nines) or 99.999% (5 Nines)

8,760 hours are available and can only be down for a maximum of 8.76 hours. 99.999% System guarantees a downtime of no more than 5.26 minutes in a year. 99% Uptime (3.5 Days of downtime per year). Ensuring Business Continuity, Maintaining Customer Trust, Upholding an Organization’s Reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Redundancy

Having backup options to ensure uninterrupted service.

Availiability

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Server Redundancy

A

Involves using multiple servers in a load balance so that if one is overloaded or fails, the other servers can take over the load to continue supporting end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Redundancy

A

Involves storing data in multiple places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Redundancy

A

Ensures that if one network path fails, the data can travel through another route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Power Redundancy

A

Involves using backup power sources to ensure that an organization’s systems remain operational during periods of power distruption or outages within a local service area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Non-repudiation

Ensuring undeniable proof of your participation in digital interaction.

Focused on providing undeniable proof in digital transactions.

A

Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.

Digital Signatures

Confirming the Authenticity of Digital Transactions, Ensuring Integrity, Providing Accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authentication

Prevent unauthorized access, Protect user data and privacy.

Something you know, Something you have, Something you are, Something you do, Somewhere you are. Two-factor Authentication (2FA) Two authentication methods. Multi-factor Authentication (MFA) Two or more authentication methods. Mult-Factor Authentication (MFA) Security process that requires users to provide multiple methods of identification to verify their identity.

A

Process of verifying the identity of a user or system.

Ensure resource validity.

Something You Know, Relies on information that a user can recall (KNOWLEDGE FACTOR). Something You Have, Relies on the user presenting a physical item to authenticate themselves (POSSESSION FACTOR). Something You Are, Relies on the user providing a unique phyiscal or behavioral characteristic of the person to validate that they are who they claim to be (INHERENCE FACTOR). Something You Do, Relies on the user conducting a unique action to prove who they are (ACTION FACTOR). Somewhere You Are, Relies on the user being in a certain geographic location before access is granted (LOCATION FACTOR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Authorization

Protect sensitive data, Maintain system integrity in organizations.

Set of rules and policies that are used to dictate what actions users can be perform once verified.

A

Defines what actions or resources a user can access.

Create more streamlined user experiences.

23
Q

Accounting

Transparency, Security, Accountability

Focuses on moderating and logging actions of users or entities during their digital interactions. Audit Trial, Regulatory Compliance, Forensic Analysis, Resource Optimzation, User Accountability.

A

Act of tracking user activities and resources usage, typically for audit or billing purposes.

Logging into the system, Accessing files, Modifying configuration settings, Downloading or installing software, Attempting unauthorized actions on systems and networks.

24
Q

Audit Trail

A

Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a specific user or point in time.

25
Q

Regulatory Compliance

A

Maintaining a comprehensive record of all the users’ activities.

26
Q

Forensic Analysis

A

Uses detailed accounting and event logs that can help cybersecurity experts understand what happened, how it happened, and how to prevent similar incidents from occurring again in the future.

27
Q

Resource Optimization

A

Organizations can optimize system performance and minimize costs by tracking resource utilization and allocation decisions.

28
Q

User Accountability

A

Through accounting system ensures users’ actions are monitored and logged, deterring potential misuse and promoting adherence to the organization’s policies.

29
Q

Syslog Servers

A

Used to aggregate logs from various network devices and systems so that system adminstrators can analyze them to detect patterns or anomalies in the organization’s systems.

30
Q

Network Analyzers

A

Used to capture and analyze network traffic to gain detailed insights into all the data moving within a network.

31
Q

Security Information and Event Management (SIEM)

A

Provides real-time analysis of security alerts generated by various hardware and software infrastructure in an organization.

32
Q

Security Controls

Technical Controls, Managerial Controls, Operational Controls, Physical Controls.

A

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data.

Preventative Controls, Deterrent Controls, Detective Controls, Corrective Controls, Compensating Controls, Directive Controls.

33
Q

Technical Controls

A

The technologies, hardware, and software mechanisms that are implemented to manage and reduce risks.

Firewalls, Encryption Processes, Intrusion Detection Systems.

34
Q

Managerial Controls

Administrative Controls.

A

Involve the strategic planning and governance side of security.

35
Q

Operational Controls

A

Procedures and measures that are designed to protect data on a day-to-day basis and are mainly governed by internal processes and human actions.

Backup Procedures, Account Reviews, User Training Programs.

36
Q

Physical Controls

A

Tangible, real-world measures taken to protect assets.

Shredding of sensitive documents, Security guards, Locking the doors.

37
Q

Preventive Controls

A

Proactive measures implemented to thwart potential security threats or breaches.

38
Q

Deterrent Controls

A

Aim to discourage potential attackers by making the effort seem less appealing or more challenging.

39
Q

Detective Controls

A

Monitor and alert organizations to malicious activites as they occur or shortly thereafter.

40
Q

Corrective Controls

A

Mitigate any potential damage and restore the systems to their normal state.

41
Q

Compensating Controls

A

Alternative measures that are implemented when primary security controls are not feasible or effective.

42
Q

Directive Controls

A

Often rooted in policy or documentation and set the standards for behavior within an organization.

43
Q

Gap Analysis

Define the scope of the analysis, Gather data on the current state of the organization, Analyze the data to identify the gaps, Develop a plan to bridge the gap.

A

Process of evaluating the differences between an organization’s current performance and its desired performance.

Technical Gap Analysis, Business Gap Analysis.

44
Q

Technical Gap Analysis

A

Involves evaluating an organization’s current technical infrastructure and identifying any areas where it falls short of the technical capabilities required to fully utilize their security solutions.

45
Q

Business Gap Analysis

A

Involves evaluating an organization’s current business processes and identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions.

46
Q

Plan of Action and Milestones (POA&M)

A

Outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task that is needed.

47
Q

Zero Trust

Control Plane, Data Plane.

A

Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.

48
Q

Control Plane

Policy Engine, Policy Administrator.

Adaptive Identity (real-time valization, takes into account the user’s behavior, device, location, and more), Threat Scope Reduction, (Limit the users’ access to only what they need for their work tasks because this drastically reduces the network’s potential attack surface), Policy-driven Access Control (Enforcing user access policies based on their roles and responsibilites), Secured Zones (Isolated environments within a network that are designed to house sensitive data).

A

Consists of the adaptive identity, threat scope reduction, policy driven access control, and secured zones.

It provides a centralized way to dictate and control how, when and where access is going to be granted. To ensure that only authenticate and authorized entities can access specific resources. Policy Engine Cross-references the access request with its predefined policies. Policy Administrator Used to establish and manage the access policies.

49
Q

Data Plane

Subject/System

Subject/System Refers to the individual or entity attempting to gain access. Policy Enforcement Point Allow or restrict access, and it will effectively act as a gatekeeper to the sensitive areas of the systems or networks.

A

Focused on the subject/system, policy engine, policy adminstrator, and estabilishing policy enforcement points.

50
Q

Threat

Where they interesect is where the risk to enterprise systems and networks lies.

A

Anything that could cause harm, loss, damage, or compromise to information technology systems.

Threat + No Vulnerability = No Risk

Natural disasters, Cyberattacks, Data integrity breaches, Disclosure of confidential information.

51
Q

Vulnerability

Where they interesect is where the risk to enterprise systems and networks lies.

A

Any weakness in the system design or implementation.

Vulnerability + No Threat = No Risk

Software bugs, Misconfigured software, Improperly protected network devices, Missing security patches, Lack of physical security.

52
Q

Risk Management

A

Finding different ways to minimize the likelihood of an outcome occuring and achieve the desired outcomes.

53
Q
A