All domains Flashcards
(171 cards)
Kerckhoff’s principle
Crypto system must be secure even if crypto algorithm is public
Which crypto principles does IPSEC provide?
Confidentiality
Integrity
In what state does a processor’s scheduler place a process when it is prepared to execute but the CPU is not currently available?
Ready state
Processor Running State
Process is executing on the CPU
Process: Waiting State
Process is blocked waiting for an external event
Process: Ready State
Process is prepared to execute but the CPU is not available
Process: Stopped state
Used when a process terminates
Maintenance hook
Backdoor created by developers
Substitution cipher examples
AES, 3DES
Transposition cipher
One for one replacement of letters. Defeated by frequency analysis.
Data custodian
Implements security controls defined by policy and mgmt. Authority delegated from data owner.
Data custodian responsibilities
Validating data integrity
Testing backups
Implementing controls defined by policy
Data Purging
Removing data so it cannot be reconstructed. Ex. DBAN
Device sanitization
All of the processes used to remove data.
“Defensible Destruction”
4 Goals of Crypto
CAIN
Confidentiality
Authentication
Integrity
Non-repudiation
C
A
I
N
Confidentiality
Authentication
Integrity
Non-repudiation
Which backup type does not clear the archive bit?
Differential
Incremental backup
Backs up all data since previous backup
Differential backup
Backs up all data that changed since last full backup
Which backup type uses fewer tapes to restore?
Differential
Which backup type uses more tapes to restore?
Incremental
Which backup type is faster to restore?
Differential
Opposite of CIA
DAD
Disclosure
Alteration
Destruction
Which law protects trade secrets?
Economic Espionage Act