Cybersecurity Flashcards
(20 cards)
Permitting authorized access to data and information while simultaneously protecting it from inappropriate disclosure is what?
Confidentiality
Integrity
Availability
Non repudiation
Confidentiality
Data at rest, in transit
Ex. Obfuscation, Intellectual property, PII, PHI
Measures degree to something not being corrupted, info at rest or in transit
Confidentiality
Integrity
Availability
Non repudiation
Integrity
Give me one example of an integrity attack
Injection or hijacking
Modifying critical files
Corrupting route and memory tables
Changing access control lists
DNS, arp, dhcp poisoning
Maintains timely and reliable access, access resources when needed
Confidentiality
Integrity
Availability
Non repudiation
Availability
Example of availability attacks
Spoofing
Flooding
Dos
Poisoning
Authorizing is the process of verifying or proving the identity of a principal
False, authentication
Authentication can operate in character (admin) or network (packet) mode
True
Ensures users can access some resources with one set of credentials but prompt them for more credential when they request elevated access is step up authenticate
True
Examples of KBA?
Security questions
Public record questions
Live conference
Name a tool for no.n repudiation
Digital sig
Digital certificate
Measure of the extent to which an entity is threatened by a potential circumstance
Vulnerability
Risk
Threat
Non repudiation
Risk
Total risk is the potential for the occurrence of an adverse event if no mitigation action is taken
True
Residual risk is inherent risk
True
Result of a risk assessment is what?
Risk register or ledger
Set of assumptions and tolerances that shape and organize approaches to managing risk is risk framing
True
Managerial controls, risk assessment, best practice, password policy, mandatory vacation, separation of duties
Administrative controls
Deliver confidentiality, integrity, authenticity, availability and non repudiation, detect security requirements
Technical controks
Infrastructure config, iOS, firewalls, EDR, Soar, are what kind of controls?
Technical
Protect people and equipment. Security guards, locks, bollsrds are what controls?
Physical