Cyber Security Fundamentals: Introduction to Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is the BEST definition of cybersecurity?

  • The process of identifying and exploiting vulnerabilities in a system.
  • The act of bypassing security controls to gain unauthorized access.
  • The technologies, processes, and practices designed to protect digital systems from attack, damage, or unauthorized access. (correct)
  • The use of physical barriers to protect computer hardware.

Configuration management is considered a managerial control in cybersecurity.

False (B)

Which of the following is a PRIMARY goal of cybersecurity?

  • To protect networks, computers, programs, and data from attack, damage, or unauthorized access. (correct)
  • To ensure systems are aesthetically pleasing and easy to use.
  • To guarantee that all data is publicly accessible for transparency.
  • To maximize system performance, even at the expense of security.

In the context of cybersecurity, what does 'vulnerability' refer to?

<p>A weakness in a system that can be exploited by a threat. (B)</p>
Signup and view all the answers

What is the goal of 'risk mitigation' in cybersecurity?

<p>reducing the chances that a threat will exploit a vulnerability</p>
Signup and view all the answers

Which of the following is an example of a 'technical control'?

<p>Encryption (B)</p>
Signup and view all the answers

A ______ control operates during the progress of an attack.

<p>detective</p>
Signup and view all the answers

Match the following security control types with their descriptions:

<p>Preventative = Stops the threat from occurring Detective = Identifies the threat while it is occurring Corrective = Remedies the effects of a threat after it has occurred Deterrent = Discourages potential attackers</p>
Signup and view all the answers

Which of the following BEST describes the purpose of preventative security controls?

<p>To stop a threat from occurring in the first place. (A)</p>
Signup and view all the answers

The 'ARP' command is used to test basic network connectivity.

<p>False (B)</p>
Signup and view all the answers

What type of security goal focuses on ensuring that data is accessible to authorized users when they need it?

<p>Availability (B)</p>
Signup and view all the answers

Hashing algorithms are primarily used to achieve which of the following cybersecurity objectives?

<p>Integrity (A)</p>
Signup and view all the answers

Firewalls, Access Control Lists, and Encryption are confidentiality controls that prevent unauthorized access to information.

<p>True (A)</p>
Signup and view all the answers

In the context of Access Controls, what does Authorization primarily grant to users?

<p>Specific privileges within a system or application. (B)</p>
Signup and view all the answers

The 'CIA Triad' stands for Confidentiality, Integrity, and ______.

<p>availability</p>
Signup and view all the answers

Which of the following is NOT an example of a physical security control?

<p>Intrusion detection system (B)</p>
Signup and view all the answers

What is the primary purpose of a 'compensating control' in cybersecurity?

<p>To provide an alternative control when a primary control is not feasible or effective. (B)</p>
Signup and view all the answers

Corrective controls are implemented before an attack takes place to prevent it from occurring.

<p>False (B)</p>
Signup and view all the answers

What type of security control is an Intrusion Detection System (IDS) primarily designed to be?

<p>Detective (A)</p>
Signup and view all the answers

What is the purpose of using 'Netstat'?

<p>show network status and protocol statistics</p>
Signup and view all the answers

Which of the following is an example of risk?

<p>Likelihood that a threat will exploit a vulnerability (A)</p>
Signup and view all the answers

Which of the following BEST describes the function of a firewall?

<p>To monitor incoming and outgoing network traffic. (C)</p>
Signup and view all the answers

Availability means that certain information should only be known to certain people.

<p>False (B)</p>
Signup and view all the answers

What is the purpose of hardening as a Preventative Security Control?

<p>To stop the threat from occurring (C)</p>
Signup and view all the answers

Which type of control is intended to discourage potential attackers?

<p>Deterrent (A)</p>
Signup and view all the answers

A ______ control is used after an attack.

<p>corrective</p>
Signup and view all the answers

What is the purpose Security Information and Event Management (SIEM)?

<p>security information and event management</p>
Signup and view all the answers

Physical and environmental security protection is considered a Managerial Control.

<p>False (B)</p>
Signup and view all the answers

What is least privilege principle?

<p>Technical control (C)</p>
Signup and view all the answers

Match the each Windows command to its description

<p>Ipconfig = used to display network interfaces configuration information Ping = Test connectivity in network Netstat = displays that show network status ARP = displays translation tables used by the Address in Networks and communication management</p>
Signup and view all the answers

Flashcards

Cybersecurity

Protecting networks, computers, programs, and data from attack, damage, or unauthorized access.

Confidentiality

Ensuring information is accessible only to authorized individuals.

Integrity

Maintaining the accuracy and completeness of information.

Availability

Ensuring timely and reliable access to information and resources.

Signup and view all the flashcards

Threats

Harmful events that can exploit vulnerabilities.

Signup and view all the flashcards

Vulnerabilities

Weaknesses in a system that can be exploited.

Signup and view all the flashcards

Risk

The likelihood of a threat exploiting a vulnerability.

Signup and view all the flashcards

Risk Mitigation

Actions to reduce the likelihood of a threat exploiting a vulnerability.

Signup and view all the flashcards

Managerial Controls

Controls that are primarily administrative in function.

Signup and view all the flashcards

Operational Controls

Controls that ensure the day-to-day operations of an organization comply with security policy.

Signup and view all the flashcards

Technical Controls

Encryption, antivirus software, and firewalls.

Signup and view all the flashcards

Preventative Controls

Security measures implemented before an attack occurs.

Signup and view all the flashcards

Detective Controls

Security measures that identify and record security events.

Signup and view all the flashcards

Corrective Controls

Security measures used to restore conditions to normal after a security event.

Signup and view all the flashcards

Physical Controls

Physical measures, such as locks and cameras, used to protect assets.

Signup and view all the flashcards

Deterrent Controls

Controls designed to discourage potential attackers.

Signup and view all the flashcards

Compensating Controls

Alternative controls implemented when a primary control is not feasible.

Signup and view all the flashcards

Encryption

A process that translates plaintext to ciphertext using algorithms.

Signup and view all the flashcards

Firewall

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Signup and view all the flashcards

Access Controls

A data security process that enables authorized access to corporate data and resources.

Signup and view all the flashcards

Authentication

Verifying a user's identity.

Signup and view all the flashcards

Authorization

Granting users specific levels of access based on their identity.

Signup and view all the flashcards

Hashing

Functions or algorithms to map object data to a representative integer value.

Signup and view all the flashcards

Integrity Monitoring Solutions

A tool designed to detect and alert on changes to key files, folders, and registry settings.

Signup and view all the flashcards

Availability

Information is accessible to those authorized to view or modify it.

Signup and view all the flashcards

Fault Tolerance

The ability of a system to continue operating without interruption, even if several components fail.

Signup and view all the flashcards

Scalability

Simply refers to the ability of an application or a system to handle a huge volume of workload or expand.

Signup and view all the flashcards

Patching

A set of changes to a computer program or its supporting data designed to update, fix, or improve it.

Signup and view all the flashcards

Hardening

A preventative control that operates before an attack can take place

Signup and view all the flashcards

Study Notes

  • Cyber Security Fundamentals is course number 1506140 at Zarqa University
  • Introduction to Security is the first topic

Overview of Core Security

  • Understanding core security goals
  • Introducing vulnerability, threat, and risk basic concepts
  • Understanding security controls

Managerial Security Controls

  • Risk assessments are a type of managerial control
  • Vulnerability assessments are managerial controls

Operational Security Controls

  • Awareness and training
  • Configuration management
  • Media protection
  • Physical and environmental protection

Technical Security Controls

  • Encryption
  • Anti-virus software
  • Intrusion Detection Systems (IDSs)
  • Intrusion Prevention Systems (IPSs)
  • Firewalls
  • Least Privilege

Security Control Functional Types

  • Preventative Controls
  • Detective Controls
  • Corrective and Recovery Controls
  • Physical Controls
  • Deterrent Controls
  • Compensating Controls

Cybersecurity Definition

  • Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage or unauthorized access in a computing context

Cybersecurity Objectives

  • Confidentiality is a cybersecurity objective
  • Integrity is a cybersecurity objective
  • Availability is a cybersecurity objective

CIA Controls

  • Firewalls relate to Confidentiality
  • Access Control Lists relate to Confidentiality
  • Encryption relates to Confidentiality
  • Hashing relates to Integrity
  • Integrity Monitoring Solutions relate to Integrity
  • Fault Tolerance relates to Availability
  • Scalability relates to Availability
  • Patching relates to Availability
  • Redundancy or Backups relates to Availability

CIA Triad: Confidentiality

  • Confidentiality means that certain information should only be known to certain people
  • This ensures that unauthorized individuals are not able to gain access to sensitive information.
  • Confidentiality controls include: firewalls, access control lists, and encryption
  • Confidentiality controls prevent unauthorized access to information.
  • Attackers try to undermine confidentiality controls to achieve unauthorized disclosure of sensitive information.

Confidentiality

  • Achieved by encryption, translates plaintext to ciphertext by using algorithms
  • Firewalls are network security devices that monitor traffic and decides whether to allow or block traffic based on defined rules
  • Access controls are a data security process that enables organizations to control who is authorized to access corporate data and resources.
  • Identification: Users prove their identity.
  • Authentication: Users prove they are who they claim to be.
  • Authorization: Grants users privileges.

CIA Triad: Integrity

  • Integrity means data is stored and transferred as intended
  • Any modification needs to be authorized
  • Designed to make sure there are no unauthorized modifications to information or systems, either intentionally or unintentionally
  • Integrity controls, such as hashing and integrity monitoring solutions, seek to enforce this requirement
  • Integrity threats may come from attackers seeking alteration of information, without authorization, or from non-malicious sources like power spikes causing data corruption

Integrity Measures

  • Hashing uses functions or algorithms to map object data to a representative integer value
  • Integrity monitoring solutions are tools designed to detect and alert changes to key files, folders, and registry settings

CIA Triad: Availability

  • Availability means that information is accessible to those authorized to view or modify it
  • Designed to ensure information and systems are ready to meet legitimate user needs when requested
  • Availability controls include fault tolerance and backups
  • These controls seek to ensure, legitimate users can gain access when needed
  • Availability threats may originate from attackers seeking disruption or non-malicious sources(fire in the datacenter)

Availability Measures

  • Fault tolerance ensures a system continues operating without interruption, even if several components fail
  • Redundancy or backups ensure that data gets replicated in case of errors
  • Scalability refers to the ability of an application or system to handle a large workload or expand
  • Patching involves a set of changes to a computer program or its supporting data designed

Basic Risk Concepts

  • Threats are harmful events, such as attacks
  • Vulnerabilities are any weakness
  • Risk is the likelihood that a threat will exploit a vulnerability
  • Risk mitigation reduces the chances that a threat will exploit a vulnerability by implementing controls

Security Controls Defined

  • Managerial controls are primarily administrative
  • Operational controls help ensure day-to-day operations comply with security policy
  • Technical Security Controls has no definition

Security Control Examples

  • Managerial Controls include Risk assessments & Vulnerability assessments
  • Operational Controls include Awareness and training, Configuration management, Media protection, & Physical and environmental protection
  • Technical Controls include Encryption, Antivirus software, Intrusion detection systems (IDS), Intrusion prevention system (IPS) & Firewalls

Security Control Functional Types

  • Preventative Controls operate before an attack can take place
    • Examples are hardening and training
  • Detective Controls operate during the progress of an attack
    • Examples are logging and system audits
  • Corrective Controls are used after an attack
    • Examples are Backups & incident handling processes
  • Physical Controls include alarms, locks, lighting, security cameras, and guards that deter and detect access to premises and hardware

Compensating and Deterrent Controls

  • Compensating Controls serve as a substitute for a principal control, and affords the same (or better) level of protection
  • Compensating controls use a different methodology or technology
  • Deterrent controls may not physically or logically prevent access but discourage an attacker from attempting an intrusion
  • Deterrent controls include signs and warnings of legal penalties against trespass or intrusion
  • Deterrent controls attempt to discourage individuals from causing an incident
  • Deterrent controls are like cable locks, or even locks on hardware devices

Prevention vs Deterrent

  • Deterrent encourages people to decide not to take an undesirable action
  • Prevention stops them from taking an undesirable action
  • Security guards can be both

Command Line Tips

  • Ipconfig is used to display information about your network configuration
  • Ping is a basic command to test connectivity
  • Netstat generates displays that show network status and protocol statistics.
  • ARP (Address Resolution Protocol) displays and modifies the Internet-to-adapter address translation tables.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Cybersecurity threats and controls
10 questions

Cybersecurity threats and controls

AdvantageousVerisimilitude avatar
AdvantageousVerisimilitude
Use Quizgecko on...
Browser
Browser