Security Plus - Chapter 1 Flashcards

1
Q

Confidentiality

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality Controls

A

Firewalls
Access Control Lists
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity Controls

A

Hashing
Integrity Monitoring Solution
Power surge protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability Controls

A

Fault tolerance
Clustering
Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nonrepudiation

A

A person that performed an action cannot later deny having taken that action. Digital signatures ensure nonrepudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DAD Triad

A

Disclosure, Alteration, Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disclosure

A

The exposure of sensitive information to unauthorized individuals. Also known as data loss and a violation of the principle of Confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Alteration

A

The unauthorized modification of sensitive information and is a violation of the principle of integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial

A

The disruption of an authorized user’s legitimate access to information. This is a violation of the principle of Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of breach impact risks

A

Financial
Reputational
Strategic
Operational
Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Financial Risk

A

The risk of monetary damage to the organization as the result of a data breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reputational Risk

A

Negative publicity surrounding a security breach that causes loss of goodwill among customers, employees, suppliers, and other stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Strategic Risk

A

The risk an organization will become less effective in meeting its major goals and objectives as a result of a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Operational Risk

A

The risk to the organizations ability to carry out its day-to-day functions as the result of a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Compliance Risk

A

When a security breach causes an organization to run afoul of legal or regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Control Objectives

A

Statements of a desired security state that the organization wishes to achieve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Security Controls

A

Specific measures that fulfill the security objectives of an organization.

21
Q

Gap Analysis

A

The Cybersecurity team reviews the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives. Any controls that do not meet the objectives are identified, and are considered potential risks that should be remediated as time and resources permit.

22
Q

Technical Controls

A

A security control category that enforces confidentiality, integrity, and availability in the digital space.
Firewall rules
Access Control lists
Intrusion prevention systems
Encryption

23
Q

Operational Controls

A

A security control category in which processes are established to manage technology in a secure manner.
User access reviews
Log monitoring
Vulnerability management

24
Q

Managerial Controls

A

A security control category where procedural mechanisms that focus on the mechanics of the risk management process.
Risk assessments
Security planning exercises
Review security in change management

25
Q

Physical Controls

A

A security control category where security controls that impact the physical access areas of an organization.
Fences
Lighting
Locks
Fire suppression
Burglar alarms

26
Q

Preventive Controls

A

A security control type that intends to stop a security issue before it occurs.
Firewalls
Encryption

27
Q

Deterrent Controls

A

A security control type that seeks to prevent an attacker from attempting to violate security policies.
Guard dogs
Barbed wire fences

28
Q

Detective Controls

A

A security control type that identifies security events that have already occurred.
Intrusion detection systems

29
Q

Corrective Controls

A

A security control type that remediates any security issues that have already occurred.
Restoration of backups

30
Q

Compensating Controls

A

A security control type designed to mitigate the risk associated with exceptions made to a policy. Controls established to be used in place of a control that is not able to be implemented. These usually do not place the same control strength as the original, so used in conjunction with an exception.

31
Q

Directive Controls

A

A security control type the informs users of the organizations systems what they should do to achieve security objectives.
Policies
Procedures

32
Q

Data At Rest

A

Stored data that resides on hard drives, tapes, in the cloud, or on other storage media.

33
Q

Data In Transit

A

Data that is in motion/transit over a network.

34
Q

Data In Use

A

Data that is actively in use by a computer system.

35
Q

Data Encryption

A

Technology that uses mathematical algorithms to protect information from prying eyes, while in transit over a network and while it resides on systems.

36
Q

Data Loss Prevention

A

A system that helps organizations enforce information handling policies and procedures to prevent data loss and theft.

37
Q

Pattern Matching

A

A DLP mechanism that watches for specific attributes of data that can be categorized as sensitive data.

38
Q

Watermarking

A

A DLP mechanism where systems or administrators apply electronic tags to sensitive documents and the DLP system monitors the systems and networks for unencrypted data containing those tags.

39
Q

Digital Rights Management

A

Enforces copyright and data ownership restrictions

40
Q

Data Minimization

A

A technique that seeks to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.

41
Q

Deidentification

A

A process that removes the ability to link data back to an individual, reducing its sensitivity.

42
Q

Data Obfuscation

A

Transforming data into a format where the original information cannot be retrieved.

43
Q

Hashing

A

Utilizes a hash function to transform a value in the dataset to a corresponding hash value.

44
Q

Tokenization

A

Replaces sensitive values with a unique identifier using a lookup table.

45
Q

Masking

A

Partially redacts sensitive information by replacing some or all of the sensitive fields with blank characters.

46
Q

Rainbow Table Attack

A

The attacker computes the hashes of known candidate values and checks to see if those hashes exist in the data file.

47
Q

Access Restrictions

A

Security measures that limit the ability of individuals or systems to access sensitive information or resources.
Geographic restrictions
Permission restrictions

48
Q

Segmentation

A

Places sensitive systems on separate networks where they may communicate with each other but have strict restrictions on their ability to communicate with systems on other networks.

49
Q

Isolation

A

Removes access for a system to or from an outside network.