1. Information Security Flashcards

(57 cards)

1
Q

P.I.I.

A

Personal Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Security

A

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Eugene Spafford quote

A

“The only truly secure system is one that is powered off…”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

C.I.A. Triad

A

The Confidentiality, Integrity, and Availability Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Negative of the C.I.A. Triad

A

The D.A.D. Disclosure, Alteration, and Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

C. of the C.I.A. Triad

A

Confidentiality - Ability to protect our data from those who are not authorized to view it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

I. of the C.I.A. Triad

A

Integrity - Ability to prevent people from changing your data in an unauthorized or undesirable manner. You need means to prevent AND reverse unauthorized change. RELIABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A. of the C.I.A. Triad

A

Availability - Ability to access our data when we need it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS Attack

A

Denial of Service Attack. Attacks the A. of the C.I.A. Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Parkerian Hexad

A

C.I.A. Triad + Possession/Control, Authenticity, and Utility (C.I.A.U.P.A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

I. in the Parkerian Hexad

A

Integrity does NOT account for authorized, but incorrect, modification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

P. of the Parkerian Hexad

A

Possession - Physical disposition of the media on which the data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A. of the Parkerian Hexad (Au)

A

Authenticity - Whether you’ve attributed the data in question to the proper owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

U. of the Parkerian Hexad

A

Utility - How useful the data is to you. NOT BINARY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of attacks (4)

A

Interception, Interruption, Modification, and Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does an Interception attack compromise of the C.I.A. Triad?

A

Confidentiality - Unauthorized user access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does an Interruption attack compromise of the C.I.A. Triad?

A

Integrity and Availability - Assets unusable/unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does a modification attack compromise of the C.I.A. Triad?

A

Integrity and Availability - Tampering with assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does a Fabrication attack compromise of the C.I.A. Triad?

A

Integrity and Availability - Generating data, processes, communications, or other similar material with a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk

A

Takes into account the value of the asset to calculate the impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Steps of Risk Management (5)

A

Identify assets > Identify threats > Assess vulnerabilities > Assess risks > Mitigate risks (Repeat as needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Types of controls (3)

A

Physical, Logical, and Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Physical controls

A

Protect the physical environment

24
Q

Logical controls AKA Technical controls

A

Protect the systems, networks, and environments that process, transmit, and store data

25
Administrative controls
Based on rules, laws, policies, procedures, guidelines, and other items that are "paper" in nature
26
Incident Response Process (6)
Preparation > Detection and Analysis > Containment > Eradication > Recovery > Post Incident Activity
27
I.D.S.
Intrusion Detection System
28
A.V.
Antivirus
29
S.I.E.M.
Security Information and Event Monitoring tool
30
M.S.S.P.
Managed Security Service Provider
31
Defense in Depth (Multilayered Defense)
External Network (Internal Network (Host (Application (Data) ) ) ) )
32
External Network Defense EXs
DMZ, VPN, Logging, Auditing, Penetration Testing, Vulnerability Analysis
33
Network Perimeter Exs
Firewalls, Proxy, Logging, Auditing
34
Internal Network Defense Exs
IDS, IPS, Logging, Auditing
35
Host Defense Exs
Authentications, AV, Firewalls, IDP, IPS, Passwords
36
Application Defense Exs
SSO, Content filtering, Data validation, Auditing
37
Data Defense Exs
Encryption, Access controls, Backups
38
Authentication (5 types)
Act of proving who/what we claim to be - Know (user, pass, pin), Have (Badge, Card, OTP), Are (Fingerprint, Iris, Retina), Do (Handwriting, Typing, Walking), Are (Geolocation)
39
Access Control Types (4)
Allowing, Denying, Limiting, Revoking
40
Sandbox (Limiting Control)
Set of resources devoted to a program, process, or similar entity, outside of which the entity cannot operate
41
C.S.R.F. (Access Control)
Cross-site request forgery - Misuses the authority of the browser on the users computer
42
D.A.C. (Access Control)
Discretionary access control
43
M.A.C. (Access Control)
Mandatory access control (Principle of least privilege)
44
Ru.B.A.C.
Rule-based access control
45
A.B.A.C. (CAPTCHA)
Attribute-based access control - Subject vs. Resource
46
Physical Access Controls
Controlling movement in/out of buildings
47
Multi-level access control models (3)
Bell-La Padula Model, Biba Model, and Brewer and Nash Model
48
Bell-La Padula Model
D.A.C. and M.A.C. "No read up. No write down"
49
Biba Model
INTEGRITY "No read down. No write up"
50
Brewer and Nash Model
Prevent conflicts of interest. Objects, Company Groups, Conflict Cases.
51
Authorization
Process of determining exactly what an authenticated party can do
52
A.C.L.s (Access Control Lists)
Lists containing info about what kind of access certain parties are allowed to have to a given system
53
File system A.C.L. Examples
Read, Write, Execute
54
Network A.C.L.s
Filter access based on identifiers like IP (Internet Protocol) Addresses, Media Access Control Addresses, and Ports
55
Ports
Numerical designation for one side of a connection between 2 devises. Used to identify the application to which traffic should be routed
56
Media Access Control Addresses
Unique identifiers hard-coded into each network interface
57
Confused Deputy Problem
When the software with access to a resource (the deputy) has a greater level of permission to access the resource than the user who is controlling the software