Chapter 6: Summary book Flashcards

1
Q

What is the security triad? CIA

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What means Confidentiality?

A

Confidentiality = to be able to restrict access to those who are allowed to see it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What means Integrity?

A

Integrity = the assurance that the information being accessed has not been altered and truly represents what is intended. Can happen unintentionally, e.g. if a computer power surge corrupts a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What means Availability?

A

Availability = the system must be available for its users. It means that information can be accessed and modified by anyone authorized to do so in an appropriate timeframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are tools for information-security policy?

A

Authentication, Acces Control, Encryption, Backup Plan, Firewall, Intrusion Detection Systems (IDS), Physical Security, Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Authentication?

A

Authentication is used to ensure that the person accessing the information is indeed who they present themselves to be. Single-factor authentication is easy to compromise, that’s why Multi-factor authentication is combining two or more of the below mentioned factors, e.g. RSA SecurID token, to ensure more security. Authentication can be accomplished by identifying someone trough:

  • something they know (e.g. user ID and password)
  • something they have (e.g. card or key)
  • something they are (physical characteristics = biometrics), this is the hardest to compromise (e.g. eye-scan or fingerprint)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Acces Control

A

Access Control ensures that users can only access the information resources that are appropriate. Access Control determines which users are authorized to read, modify, add and/or delete information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Acces Control List (ACL)

A

Access Control List (ACL) = list of users who have the ability to do specific actions. Capabilities are assigned, such as read, write, delete or add. ACL’s are simple and easy to understand. The drawback is that each information resource is managed separately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Role-Based Control List (RBAC)

A

Role-Based Control List (RBAC) doesn’t give specific users access rights, but assigns roles to users which provide access. This allows the administrators to manage users and roles separately, simplifying administration and, by extension, improving security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Encryption

A

Encryption is the process of encoding data upon its transmission or storage so that only authorized individuals can read it. The plain text that needs to be send is encoded, then the recipient receives the cipher text and decodes it (decryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is symmetric key encryption

A

Symmetric key encryption = both parties share the same encryption key, which enables them to code and decode each other’s messages. Disadvantage: key is available in two places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is public key encryption

A

Public key encryption = two keys are used; a public key and a private key. To send an encrypted message, you obtain the public key, encode the message, and send it. The recipient then uses the private key to decode it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of a good backup plan?

A
  • Full understanding of organizational information resources.
  • Regular backups of all data.
  • Offsite storage of backup data sets.
  • Test of data restoration.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a firewall

A

A firewall protects all company servers and computers by stopping packets from outside the organisation’s network that do not meet a strict set of criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hardware firewall

A

A hardware firewall is a device that is connected to the network and filters the packets based on a set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a software firewall

A

A software firewall runs on the operating system and intercepts packets as they arrive to a computer.

17
Q

What is a Intrusion Detection System

A

Intrusion Detection Systems (IDS) do not add any additional security, instead it provides the functionality to identify if the network is being attacked.

18
Q

What is physical security

A

Physical security is the protection of the actual hardware and networking components that store and transmit information resources (e.g. locked doors, physical intrusion detection, secured equipment, environmental monitoring and employee training).

19
Q

What are security policies

A

Security policies are a form of administrative control. A good information-security policy lays out the guidelines for employee use of the information resources of the organization and in case of failure, they’ll comply with a policy that will result in disciplinary action.

20
Q

How to care about Personal Information Security

A
  • Keep software up to date.
  • Install an antivirus software package.
  • Be smart about connects. Be aware of your surroundings (e.g public wifi or USB flash drives).
  • Create regular backups.
  • Secure accounts with two-factor authentication. E.g password and mobile approve.
  • Use strong passwords. Your passwords should be 8 or more characters and contain at least two of: upper-case letters, numbers, and special characters.
  • Be aware of suspicious links and attachments. E.g phising mail or Facebook post.