Security Principles and Operations – Comprehensive Review

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/326

flashcard set

Earn XP

Description and Tags

Flashcards cover key concepts across security principles, risk, privacy, governance, BCP/DR, incident response, physical and logical access, networking, threats, cloud, encryption, data handling, logging, configuration management, policy, and awareness.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

327 Terms

1
New cards

Confidentiality

The protection of sensitive information from unauthorized access or disclosure.

2
New cards

Integrity

Assurance that data and systems are accurate, complete, and unaltered without authorization.

3
New cards

Availability

Guarantee that authorized users have timely and reliable access to information and resources.

4
New cards

CIA Triad

Foundational security model consisting of Confidentiality, Integrity, and Availability.

5
New cards

Non-Repudiation

Capability that prevents a party from denying the authenticity of their actions or communications.

6
New cards

Identification (Access Control)

Process where a user claims an identity, such as by entering a username.

7
New cards

Authentication

Process of proving an asserted identity (e.g., password, fingerprint, smart card).

8
New cards

Authorization

Granting approved privileges to an authenticated subject for specific resources.

9
New cards

Accounting (Access Control)

Recording and reviewing user activities for auditability and accountability.

10
New cards

Multi-Factor Authentication (MFA)

Authentication that requires two or more different factor types (something you know/have/are).

11
New cards

Password Management

Policies and tools that control password length, complexity, history, reuse, and resets.

12
New cards

Personally Identifiable Information (PII)

Data that can uniquely identify an individual, such as name or Social Security number.

13
New cards

Protected Health Information (PHI)

Individually identifiable health data safeguarded under healthcare laws (e.g., HIPAA).

14
New cards

Privacy Obligations

Legal and ethical duties to protect personal data during collection, use, storage, and disposal.

15
New cards

Privacy Management Framework (PMF)

Nine-principle model covering management, notice, collection, use, access, disclosure, security, data quality, and monitoring.

16
New cards

Risk

Potential for loss or harm when a threat exploits a vulnerability.

17
New cards

Risk Assessment

Process of analyzing and prioritizing risks by likelihood and impact.

18
New cards

Qualitative Risk Assessment

Risk evaluation using descriptive scales (e.g., high/medium/low).

19
New cards

Quantitative Risk Assessment

Risk evaluation using numeric values such as probability percentages and monetary impact.

20
New cards

Risk Avoidance

Eliminating activities or assets that create risk.

21
New cards

Risk Transfer

Shifting risk to a third party, such as via insurance or outsourcing.

22
New cards

Risk Mitigation

Implementing controls to reduce risk likelihood or impact.

23
New cards

Risk Acceptance

Consciously deciding to tolerate a residual risk without further action.

24
New cards

Inherent Risk

Level of risk before any controls are applied.

25
New cards

Residual Risk

Remaining risk after controls have been implemented.

26
New cards

Control Risk

Risk introduced by poorly designed or implemented safeguards.

27
New cards

Preventive Control

Measure that stops security incidents from occurring (e.g., firewall).

28
New cards

Detective Control

Measure that identifies or alerts on incidents after they begin (e.g., IDS).

29
New cards

Recovery Control

Measure that restores systems and data after an incident (e.g., backups).

30
New cards

Technical Control

Security safeguard implemented through technology or hardware.

31
New cards

Administrative Control

Security safeguard implemented through policies, procedures, or training.

32
New cards

Physical Control

Security safeguard that restricts physical access or protects the environment.

33
New cards

Defense-in-Depth

Layered deployment of multiple, diverse security controls for redundancy.

34
New cards

ISC² Code of Ethics

Four canons: protect society, act honorably, serve diligently, and advance the profession.

35
New cards

Ethics Reporting Requirements

Obligation for members to report known Code of Ethics violations.

36
New cards

Ethics Complaints Process

Formal notarized submission reviewed by the ISC² Ethics Committee; can revoke certification.

37
New cards

Security Policy

High-level statement that defines what must be done to protect assets.

38
New cards

Standard (Security Governance)

Mandatory detailed requirement specifying how to meet policy objectives.

39
New cards

Guideline

Recommended best-practice advice that is optional to follow.

40
New cards

Procedure

Step-by-step instructions that detail exactly how to perform a task.

41
New cards

Regulatory Compliance

Conformance with external laws, regulations, and industry standards (e.g., GDPR, PCI DSS).

42
New cards

Business Continuity Planning (BCP)

Preparations to keep critical business functions running during adverse events.

43
New cards

Business Impact Analysis (BIA)

Process that identifies critical systems, dependencies, and recovery priorities.

44
New cards

Single Point of Failure (SPOF)

Component whose failure would stop an entire system or process.

45
New cards

High Availability (HA)

Design approach that uses redundancy to minimize downtime.

46
New cards

Fault Tolerance (FT)

Capability of a system to continue operating correctly even if a component fails.

47
New cards

Redundancy Through Diversity

Using varied vendors or technologies to avoid common-mode failures.

48
New cards

Disaster Recovery (DR)

Focused activities to restore IT operations after a disruptive incident.

49
New cards

Recovery Time Objective (RTO)

Maximum acceptable time to restore a service after disruption.

50
New cards

Recovery Point Objective (RPO)

Maximum acceptable amount of data loss measured in time.

51
New cards

Recovery Service Level (RSL)

Minimum acceptable level of service during a disruption.

52
New cards

Full Backup

Copy of all selected data every time the backup runs.

53
New cards

Differential Backup

Copy of data changed since the last full backup.

54
New cards

Incremental Backup

Copy of data changed since the most recent backup of any type.

55
New cards

Snapshot Backup

Point-in-time image of a system or volume for quick restoration.

56
New cards

Tape Backup

Low-cost, high-capacity but slower removable media for backups.

57
New cards

Disk Backup

Moderate-cost, faster disk-based storage for backups and restores.

58
New cards

Cloud Backup

Scalable off-site backup stored in a cloud service provider’s infrastructure.

59
New cards

Hot Site

Fully equipped, continuously ready alternate facility for immediate failover.

60
New cards

Warm Site

Alternate facility with hardware installed but not fully configured or live.

61
New cards

Cold Site

Basic shell facility requiring equipment and data before use.

62
New cards

Offsite Storage

Remote location used solely to hold backup media or archives.

63
New cards

Initial Response Phase

First DR stage focused on containment and alternate-site activation.

64
New cards

Assessment Phase (DR)

Phase where damage is evaluated and recovery planning is finalized.

65
New cards

Read-through Test

DR test where participants review the plan individually for accuracy.

66
New cards

Walk-through Test

Tabletop group discussion to validate DR roles and procedures.

67
New cards

Simulation Test

Scenario-based exercise that enacts a disaster without affecting production.

68
New cards

Parallel Test

DR systems are run alongside production to verify readiness without shutdown.

69
New cards

Full Interruption Test

Most thorough DR test; production is shut down to validate full recovery.

70
New cards

Incident Response Plan (IRP)

Documented strategy for preparing and responding to security incidents.

71
New cards

NIST IR Lifecycle

Four phases: Preparation; Detection & Analysis; Containment, Eradication & Recovery; Post-Incident Activity.

72
New cards

Incident Response Team (IRT)

Cross-functional group responsible for executing the IR plan.

73
New cards

Containment Strategy

Actions that isolate affected assets to limit incident spread while preserving evidence.

74
New cards

Threat Intelligence

Information about adversaries, methods, and indicators used to enhance defense and response.

75
New cards

Physical Access Control

Mechanisms (guards, locks, badges) that regulate entry to facilities and secure areas.

76
New cards

Crime Prevention Through Environmental Design (CPTED)

Design philosophy that reduces crime by influencing offender decisions via the built environment.

77
New cards

Natural Surveillance

CPTED principle that increases visibility to deter illicit activity.

78
New cards

Natural Access Control

CPTED principle that guides people toward controlled entry points.

79
New cards

Territorial Reinforcement

CPTED principle that clearly defines ownership and boundaries to discourage intruders.

80
New cards

Two-Person Integrity

Requirement that two individuals be present to access a sensitive area or asset.

81
New cards

Two-Person Control

Requirement that two individuals jointly execute a critical action to prevent abuse.

82
New cards

Least Privilege

Limiting user access rights to only what is necessary to perform job duties.

83
New cards

Segregation of Duties

Division of tasks among different roles to prevent fraud or error.

84
New cards

Mandatory Access Control (MAC)

System-enforced access model using security labels and clearances; users cannot change permissions.

85
New cards

Discretionary Access Control (DAC)

Access model where resource owners decide who can access their objects.

86
New cards

Role-Based Access Control (RBAC)

Access model that assigns permissions based on organizational roles.

87
New cards

User Account

Individual identity used for daily, non-privileged activities.

88
New cards

Administrator Account

Elevated account with broad system privileges, used sparingly under strong controls.

89
New cards

Service Account

Non-interactive account used by applications or services, not by humans.

90
New cards

Network LAN

Local Area Network that connects devices within a limited geographic area.

91
New cards

Wide Area Network (WAN)

Network that connects multiple LANs over large geographic distances.

92
New cards

Personal Area Network (PAN)

Short-range network for personal devices, often using Bluetooth.

93
New cards

Near Field Communication (NFC)

Very short-range wireless communication used for contactless payments and pairing.

94
New cards

Transmission Control Protocol (TCP)

Connection-oriented transport protocol ensuring reliable, ordered data delivery.

95
New cards

User Datagram Protocol (UDP)

Connectionless transport protocol that offers fast, best-effort delivery without guarantees.

96
New cards

Internet Control Message Protocol (ICMP)

Network protocol used for diagnostic messages like ping and traceroute.

97
New cards

OSI Model

Seven-layer conceptual framework for network communication from Physical to Application.

98
New cards

IPv4

32-bit dotted-decimal IP addressing scheme (e.g., 192.168.1.1).

99
New cards

IPv6

128-bit hexadecimal IP addressing scheme designed to replace IPv4.

100
New cards

DHCP

Protocol that automatically assigns IP configuration to network hosts.