Cornerstone security principles Flashcards

1
Q

The 3 main objectives of security are

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is information security?

A

The protection of information and information systems from unauthorized access, use,disclosure,modification,or destruction in order to provide confidentiality,integrity and availability (CIA triad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and properietary information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Guarding against improper information modification, and includes ensuring information non-repudiation and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Ensuring timely and reliable access and use of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 key cyber security tenets

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality, integrity and availability (CIA) versus

A

Disclosure, Alteration and Destruction (DAD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identification

A

-provides a weak an unproven claim of identity. -providing a username would be an example of identification. -Requires proof(authentication) prior to being granted access (authorization) to controlled data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication

A

-Serves as proof a user’s identity claim is legitimate. -Strong authentication implies higher integrity means of proof or multiple methods of proof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authorization

A

Proceeds after successful authentication and determines what the authenticated user can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Accounting

A

-Details the interaction performed by individuals. -Audit logs could be generated allowing users to be held accountable for their documented actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types/categories of authentication

A

-Something you have (such as token, smart card, or badge) -Something you are (biometrics: fingerprint, retina scan, voice, palm scans, hand geometry) -Something you know (passwords or phrases) -Something you are (such as GPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Using two or more categories of authentication are called

A

Two-factor or multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PoLP abbreviation of

A

Principle of least privilege and may also known as Minimum Necessary Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mandates individuals only be granted access necessary to perform their required functions

A

Principle of least privilege or Minimum Necessary Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk is mitigated by requiring two parties to perform what one person could.

A

Separation of Duties. -It serves as a check on excessive authority.

17
Q

Require collusion among more than one individual in order to successfully perpetrate a fraud.

A

Separation of Duties

18
Q

Force other people to be in charge of carrying out key tasks normally performed by another employee

A

Rotation of Duties or job rotation. -it is a common way of detecting fraud associated with printing excess payroll checks.

19
Q

Acting as any reasonable person would.

A

Due Care or Prudent Man Rule

20
Q

Practices or processes that ensure the decided upon standard of care is maintained

A

Due Diligence

21
Q

The implementation of due care is

A

Due Diligence

22
Q

What are major types of controls?

A

-Preventive -Detective -Corrective -Deterrent -Recovery -Compensating

23
Q

Preventive Controls

A

-Try to prevent an attack from being successful. -Will not allow a user to violate the security policy in place.

24
Q

Detective Controls

A

-Assumes an attack has begun -Tries to detect that is a problem after an attack occurs -Time-critical with detection-an attack is occurring

25
Q

Deterrent Controls

A

Discourages security violations

26
Q

Compensating Controls

A

Used to shore up identified deficiencies in existing controls

27
Q

Corrective Controls

A

Reacts to an attack and takes corrective action for data recovery

28
Q

Recovery Controls

A

Restores the operating state to normal after an attack or system failure

29
Q

Intrusion Detection IDS and Monitor sensors, job rotation, Threat-haunting and CCTV are example of

A

Detective Controls

30
Q

The access control measures could be categorized by

A

Administrative, Technical, or Physical

31
Q

Background checks, policies and procedures are example of

A

Administrative (directive) Controls

32
Q

Encryption and smart cards are example of

A

Technical controls

33
Q

Locks , securing laptops, securing magnetic media and the protection of cable

A

Physical controls

34
Q

“Beware of dogs” or “Use of deadly force is authorized” signs are example of

A

Deterrent Controls