Security Flashcards

1
Q

the same shared key was used to both encrypt and decrypt the message; faster but we have the key distribution problem - how do 2 parties agree on and share a key if they have never interacted before

A

symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

two mathematically related keys are used; one is a public key that can be shared with everyone and another is a private key that is always kept secret; is slower, but can help with the key distribution problem

A

public-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

function that maps input of any size to an output of fixed size

A

hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a hash function combined with someone’s private key can used to create a _________________

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

issued by a certificate authority (CA) - there are only a few trusted organizations around the world; can be used to prove that your public key actually belongs to you

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when hackers use psychology to trick people into divulging confidential information

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 types of malware

A

virus, worm, trojan horse, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

can insert itself into the code of other computer programs and copy itself throughout the computer and the network when the infected programs run

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is similar to a virus, but it does not need to be attached to another program, and can copy itself without any human help

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

software that appears to be harmless, but actually does something unexpected and malicious behind the scenes. The user has to launce it, and cannot replicate on its own

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

software that will either threaten to publish or prevent the victim from accessing their files unless a ransom is paid. Usually this will be some cryptocurrency so it cannot be traced to the person they paid

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 other techniques than malware

A

phishing, spam, botnet, denial of service attack, sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

use deceptive emails or text messages to social engineer users into revealing sensitive information. Often they will pretend to come form a trusted authority and will ask for confidential information

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unsolicited junk mail

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

collection of computers (usually infected ones) that are used together for a common purpose

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

involves many computers overwhelming a website by requesting a service in an attempt to block others from accessing the website

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

eavesdropping on network communication to obtain sensitive information like passwords, emails, company files, etc.

A

sniffing

18
Q

the ____, ____, and ____ that are used to prevent unauthorized access, alteration, theft, interruption, or physical damage of information systems

A

policies, procedures, technical measures

19
Q

are rules and expectations

A

policies

20
Q

are the step-by-step guides in place

A

procedures

21
Q

are controls to enforce such policies/procedures and to further safeguard information systems

A

technical measures

22
Q

6 types of security services

A

authentication, access control, data confidentiality, data integrity, availability, non-repudiation

23
Q

assurance that the other party is who they say they are

A

authentication

24
Q

prevention of unauthorized use of a resource

A

access control

25
Q

protection of data from unauthorized disclosure

A

data confidentiality

26
Q

assurance that services are available when needed

A

availability

27
Q

protection against denial by one of the parties in a communication

A

non-repudiation

28
Q

wireless security authentication methods

A

WPS, PSK, EAP

29
Q

very simple measures in place, like pushing the button on your router to join the network

A

WPS (wifi protected setup)

30
Q

you enter a passphrase to join the network

A

PSK (pre-shared key)

31
Q

may need to login with a username and password

A

EAP (Extensible Authentication Protocol) method

32
Q

wireless security protocols

A

WEP, WPA, WPA2, WPA3

33
Q

can be easily cracked

A

WEP (Wired Equivalent Privacy)

34
Q

temporarily replacement for WEP

A

WPA (WIreless Protected Access)

35
Q

very secure, used be eduroam

A

WPA2

36
Q

newest, introduced in 2018. Even more secure, expected to become more common as it’s adopted

A

WPA3

37
Q

determing points of vulnerability, level of risk, and potential damage if it were to happen

A

risk assessment

38
Q

identifies main security risks, acceptable security goals, and mechanisms to achieve these goals

A

security policy

39
Q

states acceptable uses and users of information and computers; establishes things like privacy, user responsibility, personal use of devices, access rules for different employees

A

acceptable use policy

40
Q

focused on getting the IT systems up and running after a disruption, like restoring backup files, maintaining backup systems, reconfiguring servers etc.

A

disaster recovery planning

41
Q

focused on getting the business up and running after a disruption. Not just focused in machines, but people too, like coming up with measures to operate after closures due to the pandemic, returning to the office after an evacuation, etc.

A

business continuity planning

42
Q

investigates if the current security and control framework is adequate; involves a comprehensive assessment of a company’s computer security polices, procedures, and technical measures, personnel, training, and documentation

A

security audit