Domain 1: Security Principles Flashcards

(48 cards)

1
Q

What is Information Security

A

Protecting paper documents, voice information, data, and the knowledge people have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is IT Security

A

Protecting hardware, software, and data (computers, servers, networks, firmware, data being processed, stored, and communicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cyber Security

A

Everything from IT security that is accessible from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CIA stand for

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Confidentiality

A

Keeping our data and systems safe by ensuring no one unauthorised can access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Integrity

A

Protecting data and systems against modification by making sure the data has not been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Availability

A

Ensuring authorised people can access they data they need when they need to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do we use to ensure Confidentiality

A

Disk Encryption, secure transport encryption, clean desk policies, no shoulder surfing, screen locks, strong passwords, mfa, access control, need-to-know, least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What threatens Confidentiality

A

attacks on encryption, social engineering, key loggers, cameras, backdoors in IOT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do we use to ensure Integrity

A

Cryptography, check sums, message digests/hash (md5, sha1, or sha2), digital signatures, access control, non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What threatens Integrity

A

alterations of data, code injections, attacks on encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do we use to ensure Integrity

A

IPS/IDS, patch management, redundancy in power (ups/generator), disks (RAID), traffic paths (network design), HVAC, staff, high availability design, replication of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What threatens availability

A

malicious attacks (DDOS, physical, system compromise, staff), application failures, component failure (hardware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the opposite of CIA

A

DAD - Discolsure (opposite of confidentiality): someone not authroised getting access
Alteration (oppostive of integrity): data has been changed without authorisation
Destruction (opposite of availability): your data or system are not accessible or destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IAAA

A

Identification, authentication, authorisation, accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is identification

A

your username, id number, employee number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is authentication and what are the types

A

proving you are an identity
type 1: something you know - passwords, pass phrase, pin
Type 2: something you have - ID, passport, smart card, token, cookie, phone
Type 3: something you are - biometrics, finger print, iris scan, palm vein scan, facial geometry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the minimum password requirements

A

specify minmum length, upper and lower case,, numbers, symbols, not contain usernames or easy to guess words or phrases, expiration date, not reused, limit reuse via policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is key stretching

A

adding a few seconds to password verification to make brute force an unfeasible attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Brute Force Attack

A

using the entire key space to continually guess a password until it is excepted.

21
Q

How to protect against Brute Force

A

Key stetching, limit number of incorrect guesses (clipping) - lock account when limit is reached

22
Q

what is totp

A

a type 2 authentication (something you have) which generates a a shared secret every short time period

23
Q

What is flase rejection rate (type 1 error)

A

an authorised user is rejected. Can occur when biometric settings are too strict (99%+)

24
Q

what is flase accept rate (type 2 error)

A

an unauthroised user is granted access

25
What are the two types of biometric identifiers
Physiological characteristics: finger print, palm veins, facial rec, dna, palm print, hand geo, iris, retina. Behavioral characteristic: typing rythm, walk/gait, signature, voice
26
what are some issus with biometrics
privacy: biometrics can show diseases, pregnacy, diabetes, neurological diseases breaches: pictures of your face and fingers can be used to get through biometrics scans recordings of your voice and copies of your signatures Non recreation: stolen passwords can be regenerated, biometrics can't
27
What is least privilege
the minimum necessary access needed for users to access only exactly what they need
28
what is need to know
even if you have access, if you do not need ti know, then don't access the data
29
What is DAC
discretionary access control - used when availability is most importat. access to an object is controlled by the object owner. Uses an ACL based on identity
30
what is MAC
mandatory access control - used when confidentiality is most importat. access to an object is determiend by labels and clearance.
31
what is a label
objects have labels assigned to them to allow subjects with the right clearance to access them
32
what is clearance
subjects have clearance assigned to them based on their current and future tustworthiness
33
what is rbac
role based access control - used when integrity is most important. access control mechanicsm defined around roles. A role is assigned permissions, and subjects in that roles are addedd tot he group. Can enforce seperation of duties and prevent privilege creep
34
what is abac
attribute based access control - access to objects is granted based on subjects, objexts, and environmental conditions. attributes could be subject (name, role, id, clearance), Objects (name, owner, date of creation), environment (location, time of access, threat level)
35
what is context based access control
access to an object is controlled based on parameter such as location time, sequence of responses, access history. E.g. captcha, mac address filtering
36
content based access control
access provided based on attributes or content of an object. the value and attributes of the content being accesses determine the control requirements. e.g. showing or hiding menus in applications
37
what is accountability (or auditing)
tracing an action to a subjects identity. Proves who did an action (non-repudation) usings logs
38
what type of user account has zero accountability?
shared/group accounts
39
what is non repudiation
when a user can't deny having performed a certain action
40
what is a subject
users and programs. a subject is something that manipulates an object
41
what is an object
passive data (physcial and data). an object is manipulated by a subject
42
whats privacy
the state of being free from observation or being disturbed by other people and freedom from unauthorised intrusion
43
who do we calculate risk, total risk and residual risk
risk = threat * vulnerability (or likelyhood) * impact total risk = threat * vuln * asset value Residual risk = total risk - countermeasures
44
what is a threat
a potentially harmful incident
45
what is a vulnerability
a weakness that can allow the threat to do harm
46
what is due diligence
doing the research of a countermeasure before implementation
47
due care
implementation of the countermeasure
48