Information Assurance Chapter Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

The right or permission granted to a system entity to access a system resource is called:

  • Availability
  • Authorization (correct)
  • Privacy
  • Authentication

The property that data has not been altered in an unauthorized manner is referred to as:

  • Availability
  • Integrity (correct)
  • Privacy
  • Confidentiality

What is a common access control process that compares one or more factors of identification to validate that the identity claimed by a user or entity is known to the system?

  • Non-repudiation
  • Authorization
  • Availability
  • Authentication (correct)

The right of an individual to control the distribution of information about themselves is known as:

<p>Privacy (D)</p> Signup and view all the answers

What ensures timely and reliable access to and use of information by authorized users?

<p>Availability (B)</p> Signup and view all the answers

The characteristic of data or information when it is not made available or disclosed to unauthorized persons or processes is referred to as:

<p>Confidentiality (C)</p> Signup and view all the answers

What is the inability to deny taking an action, such as sending an email message?

<p>Non-repudiation (D)</p> Signup and view all the answers

Something of value that is owned by an organization, including physical hardware and intellectual property, is known as an:

<p>Asset (D)</p> Signup and view all the answers

What is the entity that deliberately takes action to exploit a target?

<p>Threat (C)</p> Signup and view all the answers

Passing risk to a third party is referred to as:

<p>Transference (C)</p> Signup and view all the answers

Taking action to prevent or reduce the impact of an event is known as:

<p>Mitigation (C)</p> Signup and view all the answers

Ignorance of risks and continuing risky activities is a characteristic of:

<p>Acceptance (B)</p> Signup and view all the answers

Ceasing the risky activity to remove the likelihood that an event will occur is called:

<p>Avoidance (A)</p> Signup and view all the answers

An inherent weakness or flaw is known as a(n):

<p>Vulnerability (B)</p> Signup and view all the answers

Which of the following is a type of risk management response that involves eliminating or completely avoiding a risk?

<p>Avoidance (A)</p> Signup and view all the answers

What is the level of risk an entity is willing to assume in order to achieve a potential desired result?

<p>Risk Tolerance (B)</p> Signup and view all the answers

Which of the following is NOT one of the four typical ways of managing risk?

<p>Conflate (D)</p> Signup and view all the answers

A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of:

<p>Management/Administrative Control (B)</p> Signup and view all the answers

Is it possible to avoid risk?

<p>No (C)</p> Signup and view all the answers

Which of the following best describes the concept of non-repudiation?

<p>If a user does something, they can't later claim that they didn't do it. (A)</p> Signup and view all the answers

Guillermo is the system administrator for a midsized retail organization. Guillermo has been tasked with writing a document that describes, step-by-step, how to securely install the operating system on a new laptop. This document is an example of a:

<p>Procedure (B)</p> Signup and view all the answers

Lankesh is the security administrator for a small food-distribution company. A new law is published by the country in which Lankesh's company operates; the law conflicts with the company's policies. Which governance element should Lankesh's company follow?

<p>The law (A)</p> Signup and view all the answers

Kristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs. The published user agreement states that the company will not share personal user data with any entities without the users' explicit permission. According to the (ISC)² Code of Ethics, to whom does Kristal ultimately owe a duty in this situation?

<p>The users (D)</p> Signup and view all the answers

While taking the certification exam for this certification, you notice another candidate for the certification cheating. What should you do?

<p>Report the candidate to (ISC)². (D)</p> Signup and view all the answers

The concept of "secrecy" is most related to which foundational aspect of security?

<p>Confidentiality (C)</p> Signup and view all the answers

Flashcards

CIA Triad

Model that defines security in terms of Confidentiality, Integrity, and Availability.

Confidentiality

Protection against unauthorized access to sensitive information.

Integrity

Ensuring data has not been altered in an unauthorized manner.

Availability

Ensuring authorized users have timely access to data when needed.

Signup and view all the flashcards

Non-Repudiation

Ensuring a party cannot deny the authenticity of their signature on a document.

Signup and view all the flashcards

Multi-Factor Authentication (MFA)

Authentication method using two or more verification factors.

Signup and view all the flashcards

Single-Factor Authentication (SFA)

Authentication method using only one verification factor.

Signup and view all the flashcards

Authentication

The process of verifying the identity of a user.

Signup and view all the flashcards

Risk

The possibility of something bad happening.

Signup and view all the flashcards

Vulnerability

A weakness that increases the likelihood of a risk occurring.

Signup and view all the flashcards

Threat

Anything that can cause harm to data or systems.

Signup and view all the flashcards

Risk Management

The process of identifying, assessing, and prioritizing risks.

Signup and view all the flashcards

Authorization

The permission granted to access system resources.

Signup and view all the flashcards

Asset

Anything of value owned by an organization.

Signup and view all the flashcards

Compliance

Following rules, regulations, and standards set by authority.

Signup and view all the flashcards

Standards

Recommended guidelines or best practices.

Signup and view all the flashcards

Policies

General guidelines on how a company should operate.

Signup and view all the flashcards

Procedures

Step-by-step instructions on completing specific tasks.

Signup and view all the flashcards

Residual Risk

Risk remaining after security controls have been implemented.

Signup and view all the flashcards

Privacy

The right to control the dissemination of personal information.

Signup and view all the flashcards

Governance

The framework of rules, practices, and processes by which an organization is directed.

Signup and view all the flashcards

Physical Controls

Security measures that rely on physical barriers or devices.

Signup and view all the flashcards

Technical Controls

Automated safeguards carried out through technology.

Signup and view all the flashcards

Administrative Controls

Policies and procedures managing behaviors of individuals.

Signup and view all the flashcards

Threat Management

The systematic approach to identifying and mitigating threats.

Signup and view all the flashcards

Risk Tolerance

The amount of risk an organization is willing to accept.

Signup and view all the flashcards

Incident Response

The approach taken to handle a security breach or attack.

Signup and view all the flashcards

Security Controls

Measures implemented to safeguard information systems.

Signup and view all the flashcards

Risk Assessment

The process of identifying and evaluating risks to an organization.

Signup and view all the flashcards

(ISC)² Code of Ethics

A set of standards guiding the conduct of members.

Signup and view all the flashcards

Study Notes

Chapter Agenda

  • Module 1: Information Assurance
  • Module 2: Risk Management Process
  • Module 3: Security Controls
  • Module 4: Governance
  • Module 5: (ISC)² Code of Ethics
  • Module 6: Chapter Review

Module 1: Information Assurance

Module Overview

  • Foundation Concepts
  • CIA Triad
  • Authentication
  • Multi-Factor Authentication
  • Non-Repudiation
  • Privacy

The CIA Triad

  • Confidentiality
  • Integrity
  • Availability

Confidentiality

  • Protect data from unauthorized individuals

Integrity

  • Ensure data hasn't been altered improperly

Availability

  • Ensure data is accessible to authorized users

Identification

  • Process of asserting an identity and having it confirmed

Multi-Factor Authentication

  • Something you know (username/password, PIN)
  • Something you have (code, ID Badge)
  • Something you are (fingerprint, facial recognition, iris/retinal scanning)

Authentication

  • Process of proving the identity of the requestor
  • Three common methods: Something you know, something you have, something you are

Multifactor Authentication or Single Factor Authentication

  • Single-factor authentication (SFA) uses only one method
  • Multi-factor authentication (MFA) uses two or more methods

Non-Repudiation

  • Repudiate = Deny
  • Non-repudiation = non-deniability
  • Includes transactions and emails

Privacy

  • Is privacy a right?
  • United Nations Declaration of Human Rights (UDHR) 1948
  • Personally Identifiable Information (PII) - Name, photo, passport#
  • Protecting society
  • Balancing the needs of the many against the individual

Methods of Authentication

  • Knowledge-based (passphrase/secret code)
  • Token-based (tokens, memory cards, smart cards)
  • Characteristic-based (biometrics)

Non-repudiation

  • Protects against denying action

Risk Management Terminology

  • Asset: Something needing protection
  • Vulnerability: Gap or weakness in protection
  • Threat: Something aiming to exploit a vulnerability
  • Risk: Intersection of assets, vulnerabilities, and threats

Module Overview (Risk Management)

  • Risks and security-related issues are ongoing concerns
  • Risk assessment, analysis, mitigation, remediation, and communication are crucial
  • Many frameworks and models are used to facilitate the risk management process, and organizations have different tolerance levels for accepting risk
  • A risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and often a measure of the adverse impact and the likelihood of occurrence.
  • Information security risks arise in relation to a threat’s potential to harm or affect resources
  • IT risks are a subset of business risks

Threats

  • Insider threats: Deliberate, error, or incompetence
  • Outside threats: Deliberate or opportunistic
  • Cybercriminals
  • Nation States
  • Terrorists
  • Hacktivists
  • Intelligence agencies
  • Technology (e.g., bots, AI)

Vulnerabilities

  • Inherent weaknesses or flaws in systems

Likelihood

  • Probability of a vulnerability being exploited

Risk Assessment

  • Asset management
  • Physical/tangible assets (computers, servers)
  • Logical/intangible assets (information, network configuration)
  • Threat management
  • Environmental risks
  • Accidental or intentional threats
  • Vulnerability management
  • Estimating likelihood

Risk Management

  • Risk appetite/tolerance
  • Risk management responses (Accept, Avoid, Reduce/Mitigate, Share/Transfer, Insurance)

Risk Management - Context

  • How risk management is applied in a home vs. a business setting
  • High-value items vs. low-value items
  • Environmental risk factors (location, disaster prone areas)

Risk Identification

  • Understanding your organization's unique situation
  • Risk identification and prioritization by all levels of the organizations
  • Tactical, operational, and strategic plans are used in identification processes

Risk Assessment

  • Identifying, estimating and prioritizing risks to operations, assets and individuals.
  • Risk assessment activities align risk to goals and objectives
  • Identifying risks is an ongoing process and results are documented as a report for management review

Risk Treatment

  • Risk avoidance
  • Risk acceptance
  • Risk mitigation
  • Risk transference
  • Cost/impact analysis of risks

Risk Priorities

  • Qualitative risk analysis
  • Quantitative risk analysis
  • Prioritization based on likelihood and impact

Risk Tolerance

  • Risk appetite is often likened to an entity’s tolerance for risk
  • Management level tolerance for risk varies amongst various organizational departments and amongst the entire organization as a whole
  • Geographic location plays a role in levels of risk tolerance and planning/mitigation (e.g., volcanoes in Iceland as a risk)
  • Time factors and likelihood of risk occurrences will determine risk tolerance requirements in numerous ways

Security Controls

  • Detect, correct, prevent or reduce a risk
  • Part of major frameworks (ISO27001, COBIT, NIST SP800-53)
  • Administrative controls (directive behavior, policy, procedure, guidelines, standards
  • Physical control examples (PACS, door entry systems, CCTV, alarm systems
  • Technical/logical control examples (encryption, endpoint security, clustering, firewalls)

Governance

  • Compliance: Regulations, Laws, Standards, Policies, Procedures
  • Laws and/or regulations can conflict with organizational policy (in which case the law takes precedence)
  • Examples of laws and/or regulations: HIPAA, GDPR

(ISC)² Code of Ethics

  • Preamble: Safety and welfare of society
  • Canons: Protect society and the infrastructure, act honorably, provide diligent service, advance and protect professionalism

Chapter Review

  • CIA and Privacy are foundation concepts in security
  • Different authentication methods depend on assurance level
  • Risks, threats, vulnerabilities, and likelihood are formally managed by organizations based on risk appetite

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Security Principles ISC2 PDF

More Like This

Information Assurance and Security Quiz
10 questions
Information Assurance Overview and AIAP
11 questions
Introduksyon sa Information Assurance at Security
13 questions
Use Quizgecko on...
Browser
Browser