Comptia Security Plus Flashcards

(22 cards)

1
Q

what is information security?

A

Protecting data and information from unauthorised access, modification, disruption, disclosure and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is information systems security?

A

Protecting the systems (computers, servers, network devices) that hold and process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the CIA triad? give an example

A

Confidentiality (encryption)
Integrity (checksums)
Availability (redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is non repudiation

A

Guarantees that an action or event cannot be denied by the involved parties (digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the CIANA Pentagon?

A

An extension of the CIA triad with the addition of non repudiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the triple A of security

A
  • Authentication: verify identity of user or system (password checks)
  • Authorisation: Determining actions or resources an authenticated user can access( permissions)
  • Accounting: Tracking user activities and resources usage for audit or billing purposes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security control categories:

A

Technical
Managerial
Operational
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

security control types

A

Preventative
Deterrent
Detective
Corrective
Compensating
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is zero trust model

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how do we achieve zero trust

A

Control plane
Data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a control plane

A

Adaptive identity, threat scope reduction, policy driven access control and secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is data plane

A

Subject/system, policy engine, policy administrator and establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threats and vulnerabilities

what are threats?

A

Anything that can cause harm, loss, damage or compromise to our information technology systems

Examples:
Natural disaster
Cyber attacks
Data integrity breaches
Disclosure of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

threats and vulnerabilities

what are vulnerabilities?

A

Any weakness in the system design or implementation

Comes from internal factors like the following:

Software bugs
Misconfigured software
Improperly protected network devices
Missing security patches
Lack of physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the relationship between threats and vulnerabilities?

A

If you have threats but no matching vulnerability there’s no risk

If you have vulnerabilities but no matching threat there’s no risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is risk management

A

finding different ways to minimise the likelihood of an out ome and achieve the desired outcome

17
Q

What is confidentiality

A

protection of information from unauthorised access and disclosure

ensure that private or sensitive information is not available or disclosed to unauthorised individuals entities or processes

18
Q

Why is confidentiality important

A

protect personal privacy
maintain a business advantage
achieve regulatory compliance

19
Q

What are the 5 methods to ensure confidentiality

A

encryption(converting data into codde to prevent unauthorised access)

access controls(set up strong user permissions ensures only authorised personnel can access certain data types)

data masking ( obscuring specific data within a database so that its inaccessible for unauthorised users while retaining the real datas authenticity and use for authorised users

physical security measures (physical types of data such as paper records in filing cabinets and digital information in servers and workstations

training and awareness (conduct regular training on the security awarebess best practices that employees can use to protect their organisations sensitive data

20
Q

what is Integrity

A

Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorised individual

Verifies accuracy and trustworthiness of data over the entire lifecycle

21
Q

importance of integrity

A

Ensure data accuracy
Maintain trust
Ensure system operability

22
Q

five methods of integirty

A

Hashing(process of converting data into fixed sized value)

Digital signatures(integrity and authenticity)

Checksums(verify the integrity of data during transmission)

Access control(only authorised individuals can modify data and reduce risk of unintentional or malicious alterations

Regular audits(systematically reviewing logs and operations to ensure only authorised changes have been made. Any discrepancies immediately addressed)