Security Principles Flashcards

1
Q

CIA Triad

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

The characteristic of data or information when it is not made available or disclosed to unauthorized persons or processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personal Identifiable Information (PII)

A

Any information that can be used to distinguish or trace an individual’s identity and any other information that is linked or linkable to an individual, such as medical, educational, financial and employment information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Classified or Sensitive Information

A

Information that has been determined to require protection against unauthorized disclosure and is marked to indicate its classified status and classification level when in documentary form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sensitivity

A

A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

The property of information whereby it is recorded, used and maintained in a way that ensures its completeness, accuracy, internal consistency and usefulness for a stated purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Integrity

A

The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing and while in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System Integrity

A

The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State

A

The condition an entity is in at a point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Baseline

A

A documented, lowest level of security configuration allowed by a standard or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication

A

Access control process validating that the identity being claimed by a user or entity is known to the system, by comparing one (single-factor or SFA) or more (multi-factor authentication or MFA) factors of identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Thee common methods of authentication:

A

Something you know (Knowledge-based), Something you have (Token-based), Something you are(Carachteristic-based).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Example of a something you know authentiction method

A

Passwords or paraprhrases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Example of a something you have authentication method

A

Tokens, memory cards, smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Example of a something you are authentication method

A

Biometrics, measurable characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Token

A

A physical object a user possesses and controls that is used to authenticate the user’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Biometrics

A

Biological characteristics of an individual, such as a fingerprint, hand geometry, voice, or iris patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Non-repudiation

A

The inability to deny taking an action such as creating information, approving information and sending or receiving a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Privacy

A

The right of an individual to control the distribution of information about themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Asset

A

Anything of value that is owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Vulnerability

A

Weakness in an information system, system security procedures, internal controls or implementation that could be exploited by a threat source.

22
Q

Threat

A

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service.

23
Q

Risk Treatment (Deifinition)

A

The determination of the best way to address an identified risk.

24
Q

Types of Risk Treatment

A

Avoidance, Acceptance, Mitigation and Transfer

25
Q

Risk Avoidance

A

The decision to attempt to eliminate the risk entirely.

26
Q

Risk Acceptance

A

Taking no action to reduce the likelihood of a risk occurring.

27
Q

Risk Mitigation

A

Taking actions to prevent or reduce the possibility of a risk event or its impact.

28
Q

Risk Transference

A

The practice of passing the risk to another party, who will accept the financial impact of the harm resulting from a risk being realized in exchange for payment.

29
Q

Qualitative Risk Analysis

A

A method for risk analysis that is based on the assignment of a descriptor such as low, medium or high.

30
Q

Quantitative Risk Analysis

A

A method for risk analysis where numerical values are assigned to both impact and likelihood based on statistical probabilities and monetarized valuation of loss or gain.

31
Q

Risk Tolerance

A

The level of risk an entity is willing to assume in order to achieve a potential desired result. Risk threshold, risk appetite and acceptable risk are also terms used synonymously with risk tolerance.

32
Q

Security Controls

A

The management, operational and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity and availability of the system and its information.

33
Q

Types of security controls

A

Physical, Administrative and Technical

34
Q

Physical Controls

A

Controls implemented through a tangible mechanism. Examples include walls, fences, guards, locks, etc. In modern organizations, many physical control systems are linked to technical/logical systems, such as badge readers connected to door locks.

35
Q

Technical Controls

A

Security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software or firmware components of the system.

36
Q

Administrative Controls

A

Controls implemented through policy and procedures. Examples include access control processes and requiring multiple personnel to conduct a specific operation. Administrative controls in modern environments are often enforced in conjunction with physical and/or technical controls, such as an access-granting policy for new users that requires login and approval by the hiring manager.

37
Q

Adequate Security

A

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information.

38
Q

Artificial Intelligence

A

The ability of computers and robots to simulate human intelligence and behavior.

39
Q

Authorization

A

The right or a permission that is granted to a system entity to access a system resource.

40
Q

Bot

A

Malicious code that acts like a remotely controlled “robot” for an attacker, with other Trojan and worm capabilities.

41
Q

Criticality

A

A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.

42
Q

Encryption

A

The process and act of converting the message from its plaintext to ciphertext. Sometimes it is also referred to as enciphering. The two terms are sometimes used interchangeably in literature and have similar meanings.

43
Q

Governance

A

The process of how an organization is managed; usually includes all aspects of how decisions are made for that organization, such as policies, roles, and procedures the organization uses to make those decisions.

44
Q

Impact

A

The magnitude of harm that could be caused by a threat’s exercise of a vulnerability.

45
Q

Information Security Risk

A

The potential adverse impacts to an organization’s operations (including its mission, functions and image and reputation), assets, individuals, other organizations, and even the nation, which results from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems.

46
Q

Likelyhood

A

The probability that a potential vulnerability may be exercised within the construct of the associated threat environment.

47
Q

Likelihood of Occurrence

A

A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities.

48
Q

Probability

A

The chances, or likelihood, that a given threat is capable of exploiting a given vulnerability or a set of vulnerabilities.

49
Q

Risk

A

A possible event which can have a negative impact upon the organization.

50
Q

Risk Management Framework

A

A structured approach used to oversee and manage risk for an enterprise.

51
Q

Threat Actor

A

An individual or a group that attempts to exploit vulnerabilities to cause or force a threat to occur.

52
Q

Threat Vector

A

The means by which a threat actor carries out their objectives.