Cyber Security Flashcards
(6 cards)
What are the three types of security threats? Briefly explain them
CIA triad
- Confidentiality Threat - Attacks data: Gain unauthorized access to private information
- Availablility Threat - Attacks program: Deny access to the system
- Integrity Threat - Attacks data and/or program: Intends to the damage/modify the program and/or data
What are the eight core cyber security knowledge areas?
- Data security
- Software security
- Component security
- Connection security
- System security
- Organisational security
- Human security
- Societal security
Security management and operational security… What are they and their significance?
Security management is the underlying framework, principles and policies put in place to protect assets. Where operational security are best-practices put in place to help users protect themselves and/or an organisation from security threats. These compliement each other.
E.g. rules/policies about authentication put in place. Best-practice is multi-factor authentication
Security Management: Authorisation, authenitcation, system infrastructure management, attack monitoring and backups
Operational Security: Auto-logout, user command logging, multi-factor authentication
What are the three authenitcation approaches?
- Knowledge based
- Possesion based
- Attribute based
What are the attacks taught for cybersecurity and breifly explain them and link to the three types of threats
There are more than these but these are just the ones taught
- SQL Poisoning - Injection attack: Input malicious SQL responses into input fields (integrity)
- Cross-site scripting - Injection attack: Malicious javascript in the ebpage executes and damages/steals information (integrity/Confidentiality)
- Session-hijacking attack - MinM attack: Steal session cookie to impersonate an authorised user (confidentiality)
- DDoS - Denial of Service attack: Distributed DoS affects many stations. Floods server with requests to deny access (availbality)
- Brute force - Brute force attack: Repeatedly try to gain access via, for example, password generation (confidentiality)