Chapter 1 Flashcards

(37 cards)

1
Q

cia triad

A
  • confidentiality
  • integrity
  • availibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

confidentiality

A

measures used to protect the secrecy of data, resources, objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

goal of confidentiality protection

A

minimize unauthorized data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

security controls for confidentiality protection

A
  • encryption
  • access control
  • steganography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

object

A

a passive element in a security relationship, e.g., files, networks, apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

subject

A

an active element in a security relationship, e.g., users, computers, programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

access control

A

management of a subject-object relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

confidentiality attacks

A
  • capturing network traffic
  • stealing password files
  • social engineering
  • port scanning
  • shoulder surfing
  • eavesdropping
  • sniffing
  • escalating privileges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

causes of unintentional data disclosures

A
  • human error
  • oversight
  • ineptitude
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

countermeasures to ensure confidentiality

A
  • encryption
  • network traffic padding
  • rigorous access control
  • strict authentication process
  • data classification
  • personnel training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sensitivity

A

the quality of safeguarded data/info that in the event of unauthorized disclosure, may lead to damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

discretion

A
  • minimize damage/harm by controlling info disclosure

- disclosure is influenced by an operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

criticality

A
  • the importance of info to a mission

- more critical info should have more safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

concealment

A
  • minimize disclosure by hiding info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

secrecy

A

minimize disclosure of info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

privacy

A

keeping PII confidential, especially to prevent harm

17
Q

seclusion

A

reinforce confidentiality via compartmentalization and access control

18
Q

isolation

A

keeping info seperate

19
Q

integrity

A

ability to protect reliability and correctness of info

20
Q

integrity achieved by

A
  • preventing unauthorized access/changes

- keeping data consistent, especially internal/external

21
Q

aspects of integrity

A
  • validity
  • authenticity
  • completeness
  • accuracy
  • truthfulness
  • non-repudiation
  • accountability
  • responsibility
  • comprehensiveness
22
Q

non-repudiation

A

situation where subject of event cannot dispute that event occured

23
Q

availability

A

uninterrupted access to objects to all authorized subjects

24
Q

usability

A

something that is easy to use

25
accessibility
- an aspect of availability | - something accessible to anyone regardless of capabilities
26
timeliness
- an aspect of availability | - prompt or done within a time constraint
27
identification
- confirming identity prior to accessing a secure system
28
authentication
proving the confirmed identity
29
authorization
allowing access to a certain object for a specific identity
30
auditing
- aka monitory | - creating a record of all activities of subjects interacting with objects
31
accountability
- reviewing audit logs, verifying compliance and holding people accountable
32
layering
multiple controls applied against a specific threat
33
abstraction
- classifying similar elements into groups | - applying similar controls to similar objects
34
data hiding
hiding data from unauthorized subjects
35
encryption
methods for concealing data
36
security management planning
developing and implementing security policies
37
security management approaches
- top down | - bottom up (rarely used)