Section 2 - Lesson 4 Flashcards

Fundamentals of Security (17 cards)

1
Q

What is information security?

A

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information System Security?

A

Act of protecting the systems that hold and process the critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

C.I.A.

A

Confidentiality Integrity Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Ensures that information is only accessible to those with the appropriate authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Data remains accurate and unaltered unless modification is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

Information and resources are accessible and functional when needed by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-repudiation

A

Guaranteeing that a specific action or event has taken place and cannot be denies by the parties involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pentagon C.I.A.N.A

A

Confidentiality Integrity Availability Non-repudiation Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA Security

A

Authentication Authorization Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A

Process of verifying the identity of a user or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authorization

A

Defines what actions or resources a user can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Accounting

A

Act of tracking user activities and resource usage, typically for audit or billing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Controls

A

Measures or mechanism put in place to mitigate risks and protect the CIA (confidentiality, integrity and availability) of information systems and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are types of Security Controls

A

Preventative Deterrent Detective Corrective Compensating Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Zero Trust

A

Security model that operates on the principle that no one, whether from inside or outside of the organization should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Control Plane

A

Consists of the adaptive identity, threat scope reductions, policy-driven access control, and secured zones

17
Q

Data Plane

A

Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcements points