Untitled Deck Flashcards

(30 cards)

1
Q

What is Information Security (InfoSec)?

A

Protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction

Focuses on confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the components of the CIA Triad?

A
  • Confidentiality
  • Integrity
  • Availability

Each component plays a crucial role in protecting information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Confidentiality in the context of information security.

A

Ensures that information is accessible only to authorized users

Example: A hospital must keep patient records confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Integrity in the context of information security.

A

Ensures that information is accurate, complete, and unaltered

Integrity is vital for maintaining trust in data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Availability in the context of information security.

A

Ensures information and systems are accessible when needed

Essential for operational efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the CNSS Security Model (McCumber Cube)?

A

A 3D model representing:
* Information States: Transmission, Storage, Processing
* Security Goals: Confidentiality, Integrity, Availability
* Security Measures: Technology, Policies & Practices, Education & Training

Emphasizes a holistic approach to security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the components of Information Systems.

A
  • Hardware
  • Software
  • Data
  • People
  • Processes/Procedures
  • Networks

Each component plays a role in the overall information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false: Security must align with business objectives.

A

TRUE

Organizations face various risks that can impact their objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some risks organizations face regarding security?

A
  • Data breaches
  • Insider threats
  • Operational downtime

These risks necessitate a comprehensive security strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the need for Information Security in Organizations?

A
  • Protects sensitive data and intellectual property
  • Ensures regulatory compliance
  • Prevents financial loss
  • Supports customer trust and business resilience

Critical for maintaining operational integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the security principles.

A
  • Least privilege
  • Defense in depth
  • Separation of duties
  • Accountability

These principles guide the implementation of security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of security controls?

A
  • Preventive: firewalls, access controls
  • Detective: intrusion detection, audits
  • Corrective: backups, disaster recovery plans

Each type serves a different purpose in security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Threat in cybersecurity.

A

Potential danger to information systems

Understanding threats is essential for risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Attack in cybersecurity.

A

An actual attempt to exploit vulnerabilities

Attacks can lead to significant security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List some common attacks in cybersecurity.

A
  • Phishing
  • Malware
  • Ransomware
  • DDoS
  • Insider threats

Awareness of these attacks is crucial for prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does CAPEC stand for?

A

Common Attack Pattern Enumeration and Classification

A database that categorizes attack patterns.

17
Q

List examples of CAPEC categories.

A
  • Injection attacks
  • Buffer overflows
  • Privilege escalation

Understanding these categories helps in anticipating attacks.

18
Q

What are the categories of Information Security Threats?

A
  • Physical threats
  • Technical threats
  • Human threats
  • Environmental threats

Each category presents unique challenges to security.

19
Q

Define Governance in the context of security.

A

Policies, roles, and responsibilities to manage security risk

Governance ensures compliance and accountability.

20
Q

What are the roles in security governance?

A
  • CISO (Chief Information Security Officer)
  • Security Analyst/Engineer
  • Users

Each role contributes to the overall security strategy.

21
Q

What are the types of Information Security Policies?

A
  • EISP (Enterprise InfoSec Policy)
  • ISSP (Issue-Specific Policy)
  • SysSP (System-Specific Policy)

These policies guide security practices within organizations.

22
Q

Define Standards in security.

A

Mandatory requirements (e.g., ISO 27001)

Standards ensure a baseline level of security.

23
Q

What are Procedures in security?

A

Step-by-step methods to achieve security objectives

Procedures provide clarity on implementing security measures.

24
Q

What are Guidelines in security?

A

Recommended practices for security implementation

Guidelines help organizations adopt best practices.

25
What is the purpose of **SETA** programs?
Reduce human error risks ## Footnote Components include awareness, training, and education.
26
What does **ISO 27001** represent?
International standard for InfoSec management systems ## Footnote It provides a framework for managing sensitive information.
27
What is the role of **NIST**?
U.S. standard with best practices for risk management ## Footnote NIST guidelines are widely adopted in various sectors.
28
What is the focus of **COBIT**?
Governance and management framework for IT processes ## Footnote COBIT helps organizations align IT with business goals.
29
What does **Evaluation** in security program design involve?
Assess effectiveness of controls, risk posture, and compliance ## Footnote Evaluation is crucial for continuous improvement.
30
What does **Design** in security program design entail?
Develop security programs aligned with business objectives, risks, and regulations ## Footnote Proper design ensures that security measures are effective.