Information Security Flashcards

1
Q

5 ways to Analyse/Define a Risk

A
  • Assets (value of what we want to protect)
  • Vulnerabilty (weaknesses that make an attack possible
  • Threats (dangers to assets, they take advantage of vulnerabilities)
  • Attack (violation of security)
  • Countermeasures (how to prevent attacks)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do we quantify the risk of an asset?

A
  • Look at likelihood of attack
  • Probability of successful attack
  • Impact of successful attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

12 different types of Security Vulnerabilities

A
  • Backdoors
  • Direct access (unsecured networks, lost flashdrives)
  • Spoofing (keyloggers)
  • Trojans, viruses, worms
  • Privilege escalation
  • Denial of Service (overload bandwidth to trigger lockout)
  • Clickjacking (redirecting to fake websites)
  • Social Engineering (phising, baiting)
  • Media Manipulation
  • Troll armies
  • Astroturfing (combo of above to create fake popular opinion)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

8 types of Security Countermeasures

A
  • Authentication & Authorisation
  • Multi-factor authentication
  • Firewalls
  • Secure networking (https)
  • Physical separation
  • Cryptography
  • Intrusion detection
  • Formal Verification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly