Clo 1 Chapter 3 Flashcards

(23 cards)

1
Q

What is the Identity Management Process?

A

The Identity Management Process involves controlling how users/entities are recognized in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the principles of security?

A

Security principles involve controlling access to information through authentication, authorization, and accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is authentication?

A

Authentication is the act of ensuring a user’s credentials are authentic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is authorization?

A

Authorization grants permission for a user to take a particular action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is accounting in the context of security?

A

Accounting creates a record of who accessed the network, what resources they accessed, and when they disconnected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the tasks involved in identity management?

A

Tasks include assigning and changing user access, resetting passwords, tracking activities, creating and de-provisioning IDs, synchronizing identities, enforcing policies, and maintaining compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of identification?

A

Types of identification include account names, passwords, profiles, and access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the weaknesses of identification types?

A

Identification types can have weaknesses that may lead to unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the methods of authentication?

A

Methods include something you know (password, PIN), something you have (cards, token), and something you are (biometric).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is multi-factor authentication?

A

Multi-factor authentication requires two or more distinct authentication types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of authorization?

A

Authorization is the process of granting or denying a user access to resources after authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is accounting in security?

A

Accounting tracks a user’s activity, including time spent and services accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is non-repudiation?

A

Non-repudiation prevents entities from denying actions taken, using techniques like digital signatures and audit logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a threat agent?

A

A threat agent is any person or thing that can cause, carry, transmit, or support a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an attack in InfoSec?

A

An attack is an attempt to compromise the security of an information asset, which may be successful (breach) or unsuccessful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are script kiddies?

A

Script kiddies are unskilled hackers who use scripts written by others to exploit systems.

17
Q

What is a cracker?

A

A cracker is someone who removes software protection designed to prevent unauthorized duplication.

18
Q

What is a cyberterrorist?

A

A cyberterrorist is a hacker who attacks systems to conduct terrorist activities.

19
Q

What is a hacktivist?

A

A hacktivist seeks to disrupt systems to protest the operations of an organization or government.

20
Q

What are security controls?

A

Security controls are countermeasures used to prevent, detect, or minimize security risks to information assets.

21
Q

What is the definition of a threat?

A

A threat is an agent that may cause harm to the target organization.

22
Q

What is a vulnerability?

A

A vulnerability is a flaw that a malicious attacker could exploit to cause damage.

23
Q

What is an attack?

A

An attack is an attempt to compromise the security of an information asset.