Definitions Flashcards

(80 cards)

1
Q

Payment Card Industry Data Security Standard (PCI-DSS)

A

Applies to companies that process credit card payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HIPPA

A

applies to healthcare and patient records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Federal Information Security Management Act (FISMA)

A

Security standards for many federal agencies in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the CIA Triad consist of?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Confidentiality?

A

Ability to protect our data from those who are not authorized to view it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Integrity?

A

ability to prevent changing data in an unauthorized manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Availability?

A

ability to acecss data when we need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the CIA triad relate to security?

A

Allows us to discuss security measures in more detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three addtional principals in the Parkerian Hexad?

A

Control, Authenticity, and Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Control?

A

the physical possession of the media that data is stored on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authenticity

A

Whether the data is attributed to the right owner or creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Utility?

A

How useful the data is to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four categories of attacks?

A

Interception, interruption, modification, and fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which attacks affect the confidentiality of the CIA triad?

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which attacks affect the integrity of the CIA triad?

A

Interruption, modification, fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which attacks affect the availability of the CIA triad?

A

Interruption, modification, fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an interception attack?

A

allows unauthorized users to access data, applications or environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Are interception attacks primarily against confidentiality, integrity, or availability?

A

Primarily against confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an example of an interception attack?

A

eavesdropping on a call or reading someone else’s emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an interruption attack?

A

makes your assets unusuable or unavailable to you on a temporary or permanent basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Are interruption attacks primarily against confidentiality, integrity, or availability

A

Primarily affect availability, but can affect integrity as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an example of a interruption attack?

A

a DoS attack on a mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Modification Attack?

A

it involves tampering with assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Are modification attacks primarily against confidentiality, integrity, or availability?

A

primarily on integrity, but could also affect availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is an example of a modification attack?
unauthorized access to a file and then altering the data
26
What is a Fabrication Attack?
generating data, processes, communications, etc. in a system
27
Are fabrication attacks primarily against confidentiality, integrity, or availability?
primarily affect integrity, but could affect availability as well
28
What is data at rest?
data not in the process of being moved
29
What is an example of data at rest?
hard drive or flash drive
30
What is data at rest protected with?
encryption
31
What is data in motion?
data that is moving from one place to another
32
whats an example of data in motion?
sensitive data moving between your browser and the bank
33
What is data in use?
data that is actively being accessed or modified
34
What is data in use protected with?
permissions and authentication of users
35
What is a threat?
something that has the potential to cause harm
36
What is a vulnerability?
Weaknesses or holes that threats can exploit
37
What is a risk?
the likelihood that something bad will happen
38
What two things do you need in order for a risk to be possible?
a threat and a vulnerability
39
What is impact?
determines risks based on the value of an Asset
40
What does risk management do?
it compensates for risks in your environment
41
What are the 5 processes for risk management?
Identify assets, Identify threats, Assess Vulnerabilities, Assess Risks, Mitigate Risks
42
What does Identify assets mean?
Make an accurate determination of which assets are truly critical
43
What does Identify Threats mean?
identifying the threats that might affect the critical assets
44
What things do you need to be concerned with in the identify threats stage?
losing data maintaining accurate data keeping the system up and running
45
What does assessing vulnerabilities mean?
Assessing the vulnerability in the context of potential threats
46
What does assessing risks means?
making sure that there is both a threat and a vulnerability present
47
What disqualifies a risk?
no vulnerability with matching threat or no threat with a matching vulnerability
48
How do you mitigate risks?
by putting controls in place to account for each threat
49
What are the three types of controls?
physical, logical, and administrative
50
What do physical controls do?
protects the physical environment where the systems or data is stored
51
What are some examples of physical controls?
fences, gates, locks
52
What do logical controls do?
protects the systems, networks, and evironments that interact with the data
53
what are examples of logical controls?
passwords, encyrptions, firewalls, IDS
54
What do administrative controls do?
dictates how the users in the environment should behave
55
What are some examples of adminstrative controls?
rules, laws, policies or guidelines
56
What is an incident response?
Reactions based on documented incident response plans
57
What's important to do with these response plans?
should be reviewed regularly, tested, and practiced by those enacting them
58
What are the four processes of the incident response plan?
Prepartion, detection and analysis, containment, eradication, recovery, and post-incident activity
59
What happens during the preparation stage?
creating policies and procedures, training and education, developing and maintaining documentation
60
What happens during the detection and analysis phase?
detects an issue, decide on whether its an incident, and repond appropriately
61
what tools are used during the detection phase?
Intrusion detection system (IDS) Antivirus software (AV) firewall logs proxy logs
62
What happens during the analysis phase?
decides what contitutes an incident, evaluate criticality, contacting additonal resources if needed
63
What does Containment mean?
ensuring the situation doesnt cause more damage
64
What are examples of what to do for containment?
disconnecting the server, firewall rules in place, updating signatures on the IDS
65
What does eradication mean?
removes the effect of the issue from the enviroment
66
What are examples of what to do for eradication?
scanning other hosts for malware, examing logs on the server or network to remove malware
67
What does recovery entail?
restoring devices or data from backup media, rebuilding systems, reloading applications
68
What is the Post-Incident activity do?
determines exactly what happened, why, and prevention
69
What is defense in depth?
multilayerd defense that will still be succesful should a defensive measure fail
70
What are some layers you might have in place?
data, application, host, internal network ,and external network
71
why is it important to have defenses at each layer?
makes it difficult for attackers to penetrate the network and directly attack assets
72
What is the goal of defense in depth?
to notice an attack in progress and have time to prevent it
73
How can you add complexity to the defensive model?
physical defenses, making policies, and user awareness/training
74
What defenses would you use for the external layer?
DMZ, VPN, Logging
75
What defenses would you use for the network perimeter?
Firewalls, Proxy servers, logging
76
What defenses would you use for the internal network?
IDS, IPS, Logging, Auditing
77
What defenses would you use for the Host?
Authentication, Anti-virus, Passwords, Hashing
78
What defenses wold you use for the Application?
SSO, Content filtering, Data Validation
79
What defenses would you use for Data?
Encryption, Access controls, backups
80
What is penetration testing?
method of finding gaps in your security using attacks that an attacker would use