Understanding Core Security Goals Flashcards

1
Q

What is the CIA model?

A

Confidentiality
Integrity
Accessability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Prevents unauthorized access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption

A

Scrambles data to make it unreadable to unauthorized viewers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the access controls (IAA)

A

Identification: identity of user
Authentication: credentials of user.
Authorization: data user has been given permission to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Verifies that data has not been altered. Typically by using hash algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

Data and services are available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Redundancy

A

backup of critical systems to provide fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disk redundancy

A

duplicate disk drives
Examples:RAID-1 (mirroring)
RAID-5 (striping with parity)
RAID-10 (striping with a mirror)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disk redundancy

A

duplicate disk drives
Examples:
RAID-1 (mirroring)
RAID-5 (striping with parity)
RAID-10 (striping with a mirror)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Server Redundancy

A

Failover clusters of servers to redundant servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network redundancy

A

Load balancing using multiple server clusters and NIC cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scalability

A

the ability to manually add resources when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

elasticity

A

a system that automatically scales resources up or down as needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Patching

A

Software code released by software vendor to resolve known issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fault Tolerance

A

increases the availability of system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Resiliency

A

actions designed to quickly recover from a failure.

17
Q

Risk

A

Likelihood of a threat resulting in a loss

18
Q

threat

A

any instance or event that can compromise Confidentiality, Integrity, or Availability of resources

19
Q

vulnerabilitty

A

a weakness in a system

20
Q

security incident

A

an event or series of events the negatively effect CIA

21
Q

Risk Mitigation

A

countermeasures and safeguards the reduce the threat risk of exploiting a vulnerability

22
Q

Managerial Controls

A

administrative in function
Provide policy and documentation of security policies

23
Q

Operational Controls

A

day to day activities that implement security policies

24
Q

Technical Controls

A

Hardware, Software and firmware designed to reduce vulnerabilities

25
Q

Preventative Controls

A

Hardening: Making systems more secure than default settings

Training: Make users aware of vulnerabilities
Security Guards

Change management: implementing policies restricting changes to systems and applications
Account disablement Policies:

26
Q

what are detective controls?

A
  1. Log monitoring - review logs that record details of activities in a system.
  2. security information and event management - (SIEM) - detects trends and triggers alarms in real time.
  3. Security audit - examines the security posture of an organization.
  4. CCTV
27
Q

Corrective and Recovery controls

A
  1. Backup and System recovery.
  2. Incident handling processes.