#31 Flashcards

(44 cards)

1
Q

What means that only authorized people should be able to access or read specific computer systems and data?

A

Secrecy or Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data breeches are where hackers reveal peoples credit card info. This is an example of what?

A

Secrecy or Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What means that only authorized people should have the ability to use or modify systems and data?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hackers who learn your password and send emails masquerading as you is what?

A

Integrity hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What means that authorized people should always have access to their systems and data?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of Service Attacks are where hackers overload a website with fake requests to make it slow or unreachable to others. This is an example of what?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To achieve the three goals security experts start with a specification of who your “enemy” is, at an abstract level. This is called a what?

A

Threat Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What profiles attackers: their capabilities, goals and probable means of attack?

A

Threat models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How a system is secured depends heavily on who it’s being secured against.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Often you’ll see threat models specified in terms of technical capabilities. An example of this is someone who has physical access to your laptop along with ________ _______.

A

Unlimited Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

There are many methods for protecting computer systems, networks and data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two main security questions:
1.
2.

A
  1. who are you?

2. what should you have access to?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the process by which a computer understands who it is interacting with?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Three types of authentication
1.
2.
3.

A
  1. What you know
  2. What you have
  3. What you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Based on the knowledge of a secret that should be known only by the real user and the computer.

A

What you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Username and Password

A

What you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Based on possession of a secret token that only the real user has.

A

What you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical key and lock

A

What you have

19
Q

Based on you! You authenticate by presenting yourself to the computer.

20
Q

biometric authenticators, like fingerprint and iris scanners

21
Q

How many possible combinations for 4 digit PINs?

22
Q

Brute Force Attack means that it tries everything.

23
Q

How many combinations with an 8 digit PIN?

24
Q

How many combinations with an 8 digit PIN that has upper and lowercase as well as symbols?

25
Three words together for a password would allow how many possibilities?
1 quadrillion
26
What is even better passwords against more sophisticated kinds of attacks ?
Non-dictionary words
27
Biometric authentication is what?
probabilistic
28
An attacker may be able to guess your password or steal your phone but it is much harder to do both. This is an example of what ?
Two factor Authentication
29
Once a system knows who you are it needs to know what you should be able to access, This is done through permissions or access control lists which describe what access each used has for every file, folder, or program on a computer.
After Authentication come Access Control
30
Permissions 1. 2. 3.
1. read 2. write 3. execute
31
What allows a user to see the contents of a file
read
32
What allows a user to modify the contents
write
33
What allows a user to run a file
execute
34
Three levels of Access: 1. 2. 3.
1. public 2. secret 3. top secret
35
People shouldn't be able to read up.
True
36
People shouldn't be able to write down.
True
37
"No read up, No write down." Bell-LaPadula Model was formulated for who?
The US Department of Defense's Multi-level security policy
38
Chinese Wall Model | Biba Model
Models for Access Control
39
Malicious Software
Malware
40
Most security errors come from implementation error
True
41
One of the holy grails of a system level security is a security kernel or a trusted computing base: A minimal set of operating system software that is close to probably secure?
True
42
What works by having a code audited by a crowd of security- minded developers?
Independent Verification
43
DEF CON - Las Vegas
True
44
Operating systems attempt to sandbox, applications by giving each their own block of memory that other programs can't touch.
Isolation