Securit+ Flashcards

1
Q

What is the CIA Triad?

A

Three principles of security control and management. Also known as the information security triad. Also referred to in reverse order as the AIC triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-repudiation

A

The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

National Institute of Standards and Technology (NIST)

A

Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cybersecurity frameworks (CSF)

A

Standards, best practices, and guidelines for effective security risk management. Some frameworks are general in nature, while others are specific to industry or technology types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

security controls

A

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Gap analysis

A

An analysis that measures the difference between the current and desired states in order to help assess the scope of work included in a project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

identity and access management (IAM)

A

A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identification

A

The process by which a user account (and its credentials) is issued to the correct person. Sometimes referred to as enrollment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

A method of validating a particular entity’s or individual’s unique credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorization

A

The process of determining what rights and privileges a particular entity has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accounting

A

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

authentication, authorization, and accounting (AAA)

A

A security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security control

A

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Managerial

A

The control gives oversight of the information system. Examples could include risk identification or a tool allowing the evaluation and selection of other security controls.

18
Q

Operational

A

A category of security control that is implemented by people.

19
Q

Technical

A

The control is implemented as a system (hardware, software, or firmware). For example, firewalls, antivirus software, and OS access control models are technical controls.

20
Q

Physical

A

Controls such as alarms, gateways, locks, lighting, security cameras, and security guards that deter and detect access to premises and hardware are often placed in a separate category to technical controls.

21
Q

Preventive

A

A type of security control that acts before an incident to eliminate or reduce the likelihood that an attack can succeed.

22
Q

Access control lists (ACL)

A

The collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).

23
Q

Detective

A

A type of security control that acts during an incident to identify or record that it is happening.

24
Q

Corrective

A

A type of security control that acts after an incident to eliminate or minimize its impact.

25
Q

Directive

A

A type of control that enforces a rule of behavior through a policy or contract.

26
Q

Deterrent

A

A type of security control that discourages intrusion attempts.

27
Q

Compensating

A

A security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations.

28
Q

Chief Information Officer (CIO)

A

A company officer with the primary responsibility for management of information technology assets and procedures.

29
Q

Chief Technology Officer (CTO)

A

A company officer with the primary role of making effective use of new and emerging computing platforms and innovations.

30
Q

Chief Security Officer (CSO)

A

Typically the job title of the person with overall responsibility for information assurance and systems security.

31
Q

Information Systems Security Officer (ISSO)

A

Organizational role with technical responsibilities for implementation of security policies, frameworks, and controls.

32
Q

Security operations center (SOC)

A

The location where security professionals monitor and protect critical information assets in an organization.

33
Q

Development and operations (DevOps)

A

A combination of software development and systems operations, and refers to the practice of integrating one discipline with the other.

34
Q

DevSecOps

A

A combination of software development, security operations, and systems operations, and refers to the practice of integrating each discipline with the others.

35
Q

Computer incident response team (CIRT)

A

Team with responsibility for incident response. The CSIRT must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).

36
Q

Vulnerability

A

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

37
Q

Threat

A

A potential for an entity to exploit a vulnerability (that is, to breach security).

38
Q

Intentional

A

A threat actor with a malicious purpose.

39
Q

Unintentional

A

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

40
Q

Risk

A

Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.