The Security: General VIEW Flashcards

1
Q

what is the security in general View?

A

Security is the condition of being protected from any harm, danger, unauthorized access, and the measures taken to ensure safety, stability and protection from any potential vulnerabilities, threats, attacks and risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security designed for?

A

security is designed to protect the assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security is designed to protect the assets from what?

A

to protect it from various types of Risks: including (Damage, misuse or unauthorized access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why is security important?

A

1- protection from threats
2- safeguarding assets
3- maintaining trust and reputation
4- compliance with regulations
5- preventing financial loss
6- security, in its broadest sense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain: Security is important to protect from threats ?

A

Security protects against a variety of risks, from physical attacks and theft to cyberattacks and data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

explain: Security is important to safeguarding assets?

A

it helps preserve the confidentiality, integrity and availability of critical assets, whether its data, infrastructure, or intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

explain: Security is important to maintaining trust and reputation ?

A

Effective security practices build trust with customers, partners, and stakeholders, as they know that their information and assets are being protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explain: Security is important to Compliance with regulations?

A

Many industries have security requirements to protect personal data and ensure compliance with laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

explain: Security is important to prevent financial loss?

A

security measures help avoid costly breaches, legal consequences , and loss of business due to downtime, damage, or theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

explain: Security is important in its broadest sense?

A

it is about ensuring that systems, assets and individuals are protected from various risks and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the goal of security?

A

the goal of Security is to maintain a safe and stable environment, mitigate risks, and ensure that important assets are safeguarded from harm or unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key objectives of security

A

PDRR
1- prevention
2- Detection
3- Response
4- Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key objectives of security
What do we mean by the key (Prevention)

A

The proactive measures taken to stop security incidents or breaches before they occur, This includes using security protocols, firewalls, encryption, and physical barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key objectives of security
What do we mean by the key (Detection)

A

The ability to identify when a security threat or breach is occurring. This includes monitoring systems for unusual activity, setting up alerts, and using intrusion detection systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key objectives of security
What do we mean by the key (Response)

A

The actions taken to address and mitigate the effects of security breach or attack, it involves having a clear incident response plan and being able to take immediate action to contain and resolve issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key objectives of security
What do we mean by the key (Recovery)

A

The process of restoring normal operations after a security breach or disaster. this involves data backup, disaster recovery plans, and business continuity strategies to minimize downtime and loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The term assets refers to ?

A

Anything of value (Resources) that needs to be protected from potential threats, risks, or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

there are two types of assets ?

A

1-Tangible (Physical)
2- intangible ( digital or intellectual)
-they can be critical to the functioning an organization, system, or individual.

-protecting assets is a central goal of any security strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Losing or damaging these assets could lead to what?

A

1- Significant financial loss
2- reputational damage
3- operational failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

in security the distinction between Tangible and Intangible assets relates to what ?

A

relates to their physical presence and how they are protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are the Tangible assets?

A

Tangible assets : These are physical, material objects that can be touched or measured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Examples of the Tangible assets?

A

-Hardware: Servers, Computers, network devices
-Facilities: Data centers, office buildings
-Physical documents: Printed contracts or blueprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Mention the security measures for the tangible assets?

A

-Physical security: Locks, surveillance cameras, and access control
-Environmental controls: Fire suppression, temperature regulation
-Insurance to cover physical loss or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the Intangible assets?

A

These are non-physical resources that provide value but cannot be touched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Examples of the Intangible assets?

A

-Data: Customer information, intellectual property, trade secrets
-Digital assets: software, databases, cryptographic keys
-Brand reputation: Market perception and goodwill
-Compliance: patents, licenses, and legal rights

26
Q

Mention the security measures for the Intangible assets?

A

-Cybersecurity: Firewalls, encryption, intrusion detection systems
-Data backups and disaster recovery
-Intellectual property protection: Copyrights, trademarks, and policies
-Risk management: Reputation monitoring and legal strategies

27
Q

Types of assets that should be secure?

A

1-Information assets
2-physical assets
3-Digital assets
4-Network assets
5-Human assets

28
Q

in the information assets, the data should be secure in 3 regions?

A

1-Data at Rest: stored data such as databases
2-Data at Transit: Data being transmitted over networks
3-Data in use: Data actively being processed by applications

29
Q

There are two types of physical assets mention them?

A

-Hardware: Servers, workstations, network devices, and storage devices
-Facilities: Buildings, data centers, and physical storage locations

30
Q

there are 3 types of Digital assets mention them?

A

-Applications: software and operating systems
-intellectual property: source code, designs, algorithms
-Configuration files: critical system configurations and network setup details

31
Q

There are two types of the Network assets mention them?

A

-network infrastructure: Routers, switches, firewalls, and other connected devices
-Cloud Resources: virtual machines storage buckets, and APIs

32
Q

There are two types of the Human assets mention them?

A

-personnel: Employees, contractors, and third-party partners
-Identify and access credentials: Usernames, passwords, and authentication tokens

33
Q

Protecting assets is crucial for several reasons

A

1- Prevention of loss
2-Preserving confidentiality, integrity
3-Business continuity
4-Reputation management

34
Q

one of the reasons to protect the assets is (prevention of loss) explain?

A

Losing or damaging critical assets can lead to financial losses, legal consequences or business failure

35
Q

one of the reasons to protect the assets is (Preserving confidentiality, integrity) explain?

A

For sensitive data or intellectual property, protecting assets ensures that only authorized individuals have access to valuable or private information

36
Q

one of the reasons to protect the assets is (Business continuity) explain?

A

By protecting physical, digital, and human assets, organizations can continue their operations without disruption and recover quickly in case of an incident

37
Q

one of the reasons to protect the assets is (Reputation management) explain?

A

Safeguarding your assets especially reputation helps maintain public trust and credibility, which are essential for long term success

38
Q

(Information security, cybersecurity, internet security, network security , web security) How they relate to one another?

A

1- information security as the foundation: (Interconnection), IS is the overarching discipline aimed at protecting data in all forms, making it the foundation for all other types of security
2-cybersecurity: Focuses on protecting digital data (subset of IS)
3-Internet Security: Secures online communication and data, ensuring information is not intercepted or altered during internet activities
4-Network security: prevents unauthorized access to the networks where information flows
5-Web Security: protects web applications and websites that store or process sensitive information

39
Q

define Cybersecurity?

A

Cybersecurity is a broader concept that includes protecting all digital infrastructure from cyber threats its a subset of information security

40
Q

cybersecurity encompasses aspects of ?

A

-Internet
-network
-web security

41
Q

what do we mean by (Internet security)?

A

Addresses threats arising specifically from internet-based activities (eg: phishing or malicious websites) which are part of broader cybersecurity strategies

42
Q

what do we mean by (Network security)?

A

A key subset of cybersecurity, as networks are critical pathways for cyberattacks

43
Q

What do we mean by (Web security)?

A

Ensures that websites and applications, which are common cyberattack targets, are secure

44
Q

Network security serves as what ?

A

Network security serves as the backbone for protecting all other digital communication and system

45
Q

when the information security is compromised?

A

the information security is compromised as data in transit can be intercepted

46
Q

when cybersecurity is weakened?

A

cybersecurity is weakened since many cyberattacks exploit network vulnerabilities

47
Q

when the (Internet security) and the (Web security) are ineffective?

A

when the (Internet security) and the (Web security) are ineffective if attackers can compromise the underlying network

48
Q

Web security supports two things from the FIGURE?

A

1-Internet security
2-Information security

49
Q

Web security focuses on what?

A

Web security focuses on protecting websites and web applications, which are often gateways to sensitive information

50
Q

Internet security relies on what?

A

Internet security relies on secure web environments to protect online users

51
Q

Information security ensures what?

A

Information security ensures sensitive data submitted through web applications is safe

52
Q

What is the interaction between Cloud security and information security?

A

Protects sensitive data stored or processed in the cloud by applying encryption, access control, and backup strategies

53
Q

What is the interaction between Cloud security and Cybersecurity?

A

Defends cloud systems against cyber threats like ransomware, malware, and unauthorized access

54
Q

what is the interaction between cloud security and internet security?

A

Secures internet- based access to cloud platforms by encrypting data in transit and protection against phishing

55
Q

what is the interaction between cloud security and Network security?

A

Secures the connections between users, on-premises systems, and cloud environments by using firewalls, VPNs, and network segmentation

56
Q

what is the interaction between cloud security and Web security?

A

Protects web applications hosted in the cloud from vulnerabilities like cross-site scripting (XSS) or SQL injection.

57
Q

What do we mean by this phrase?
(Hardening systems and Resources)

A

-Security is about making it harder to exploit vulnerabilities
-The goal is to deter attackers by increasing effort and reducing reward

58
Q

What do we mean by this phrase?
(Discouraging Attackers)

A

-When security layers are strong and complex, attackers are less likely to succeed
-Most attackers will give up if the effort outweighs the potential gain

59
Q

Explain (No such thing as perfect security) phrase?

A

Absolute security is unattainable, but adequate security is achievable

60
Q

what is the Layered security approach (1-Network, 2-Host, 3-Application, 4-Data)

A

Combining multiple layers of protection creates a stronger defense, if one layer fails, others compensate, reducing overall risk.