Terms & Concepts Flashcards

1
Q

What is the CIA triad?

A

CIA stands for confidentiality, integrity and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the “C” in the CIA triad?

A

“C” stands for confidentiality.

Sensitive information is only accessible by authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define the “I” in the CIA triad.

A

“I” stands for integrity.

Maintaining the accuracy and completeness of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define the “A” in the CIA triad.

A

“A” stands for availability.

Information and resources should be available to authorized individuals when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of least privilege?

A

Granting users the minimum level of access (or permissions) necessary to perform their job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain “defense in depth”.

A

Implementing multiple layers of security controls to protect information and resources, so that if one layer fails, others still provide protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain “zero trust”.

A

A security model that assumes no implicit trust, verifying every access request as though it originates from an open network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define RBAC.

A

RBAC stands for role-based access control.

Assigning permission to users based on their role within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ABAC.

A

ABAC stands for attribute-based access control.

Granting access based on user attributes (eg. department, location) and environmental conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain multi-factor authentication (MFA).

A

MFA involves requiring two or more verification factors to authenticate a user, enhancing security beyond just passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain single sign-on (SSO).

A

Allowing users to authenticate once and gain access to multiple systems without re-entering credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain privileged access management (PAM).

A

Controlling and monitoring accounts with elevated permissions to reduce the risk of misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “federation”.

A

Federation is linking a user’s identity across multiple identity management systems, often used for SSO across organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain identity lifecycle management.

A

Managing user identities from creation to deactivation, including onboarding, role changes, and offboarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain third-party risk assessment.

A

Evaluating the security posture of vendors who have access to your systems or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define service-level agreements (SLA).

A

Contracts that define the level of service expected from a vendor, including security commitments.

17
Q

What is supply chain security?

A

Ensuring that security is maintained throughout the supply chain to prevent breaches via third-party vendors.

18
Q

Explain vendor onboarding and offboarding.

A

Processes for securely integrating new vendors and removing their access when no longer needed.

19
Q

Define due diligence.

A

Conducting thorough evaluations of a vendor’s security practices before engagement.

20
Q

What is GDPR?

A

GDPR stands for General Data Protection Regulation.

EU regulation on data protection and privacy for individuals within the European Union.

21
Q

What is the California Consumer Privacy Act (CCPA)?

A

California state law enhancing privacy rights and consumer protection for residents of California.

22
Q

What is SOC2?

A

SOC2 stands for Service Organization Control 2.

Framework for managing customer data based on five trust service principles: security, availability, processing integrity, confidentiality, and privacy.

23
Q

What is ISO / IEC 27001?

A

International standard for information security management systems (ISMS).

24
Q

What is HIPAA?

A

HIPAA stands for Health Insurance Portability and Accountability Act.

US regulation safeguarding medical information.

25
Q

What is PCI DSS?

A

PCI DSS stands for Payment Card Industry Data Security Standard.

Security standards for organizations that handle credit card information.

26
Q

What is the NIST Cybersecurity Framework?

A

A set of guidelines for improving critical infrastructure cybersecurity, including Identify, Protect, Detect, Respond, and Recover functions.

27
Q

Explain CIS controls.

A

CIS stands for Center for Internet Security.

A prioritized set of actions to protect organizations against the most common cyber threats.

28
Q

What is the OWASP Top Ten?

A

OWASP stands for Open Worldwide Application Security Project.

A list of the top ten most critical web application security risks, providing guidelines to mitigate them.

29
Q
A