Network and Computer Security Flashcards

1
Q

What are the three fundamental goals of information security?

A

Confidentiality, Integrity and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Confidentiality?

A

Protecting information from disclosure to unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Integrity?

A

Protecting information from being modified by unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability?

A

Ensuring that information is available to authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Identification?

A

Associating an identity with a subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Authentication?

A

Verifying the validity of something (usually the identity claimed by a system entity).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Authorization?

A

Granting or denying the right or permission of a system entity to access an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four types of authentication?

A
  • Something that you know such as a password.
  • Something that you have such as a physical card.
  • Something that you are, so biometrics.
  • Context Location such as your current location.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is multi-factor authentication?

A

When several factors for authentication are combined. A common type is two factor authentication, which requires a password, and then a code sent to a phone. A good multi-factor authentication system uses two different types of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering?

A

Attackers making use of human nature and getting information such as a password or key information out of a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some issues with biometrics?

A

Nearly all biometrics can be compromised such as fingerprints copied. Biometrics cannot be changed if compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is access control?

A

This is how we can authorise users. It specifies who (Subject) is allowed to do what (Request) on what (Object). Subject is a set of users on a system, Object is the set of resources to which access is being controlled, and Request is the set of possible actions (such as read and write) a user may want to perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Access Control Policy?

A

Defines what is allowed or forbidden in a system. It is analogous to a set of laws usually defined in terms of rules or requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does an Access Control Matrix Model work?

A

Has a set of current subjects S, a set of current objects O, and and the privileges for each combination of S and O.

For Example:
File 1 File 2
Alice Read
Bob Write Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Role Based Access Control?

A

Has Roles and Users. Each user will have a role, and each role will have permissions. This takes away the issues large organisations have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a Role Based Access Control Matrix work?

A

Has a set of Roles R, a set of current objects O, and and the privileges for each combination of R and O.

For Example:
File 1 File 2
User Read
Admin Write Write

17
Q

What is Discretionary Access Control?

A

A model used by Unix file systems in which the owner of a file controls the permissions for that file. It also allows users to be assigned to groups which can also own files.

18
Q

What is the Bell-LaPadula model?

A

An access control system which uses security levels. Files and users both have security levels. Users can read files with an equal or lower security level. Users cannot write to files with a lower security clearance.

19
Q

What is usage control?

A

Controlling the use of the documents for example how many times you can access it and can you share it.

20
Q

What is Break-Glass Access Control?

A

Having accounts who have permissions to access everything/more things in case of an emergency. These accounts are usually heavily logged.

21
Q

What is Steganography?

A

The science of hiding messages inside other messages or images.

21
Q

What is Cryptography?

A

The science of secret writing, encrypting information so that only people who know something can know the information.

22
Q

What is Cryptanalysis?

A

The science of analysing a cryptographic system to break/circumvent its protection.

23
Q

What is symmetric encryption?

A

Where the decryption key is or can be derived from the encryption key.

24
Q

What is asymmetric encryption?

A

Where the decryption key can’t be derived from the encryption key, so the the public key can be published without compromising the private key.