Exam 1 Flashcards
(78 cards)
OSI Layer “Please”
- Physical
OSI Layer “Do”
- Data Link
OSI Layer “Not”
- Network
OSI Layer “Throw”
- Transport
OSI Layer “Sausage”
- Session
OSI Layer “Pizza”
- Presentation
OSI Layer “Away”
- Application
The name fo the Internet standards architecture is _________
TCP/IP
________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication.
Rate limiting
Threat Environment
The threat environment consists of the types of attackers and attacks that companies face
Security Goals
Confidentiality, Integrity, Availability
Confidentiality
Confidentiality means that people cannot read sensitive information, either while it is on the a computer or while it is traveling across a network
Integrity
Integrity means that attackers cannot change or destroy information, either while it is on a computer or while it is traveling across a network. Or, at least, if information is changed or destroyed, then the receiver can detect the change or restore destroyed data.
Availability
Abailability means that people who are authorized to use information are not prevented from doing so
Compromises
Successful attacks (aka incidents, breaches)
Countermeasures
Tools used to thwart attacks (aka safeguards, protections, and controls)
Types of countermeasures
Preventative
Detective
Corrective
PCI-DSS
Payment Card Industry-Data Security Standard
Rules for companies that accept credit card purchases
Has 12 requirements
Employees and ex-employees are dangerous because:
They have knowledge of internal systems
They often have teh permission to access systems
They often know how to avoid detection
Employees generally are trusted
(IT and especially IT security professionals are the greatest employee threats)
Employee sabotage
Destruction of hardware, software, or data
Plant time bomb or logic bomb on computer
Employee hacking
hacking is intentionally accessing a computer without AUTHORIZATION or in excess of authorization
Employee financial threat
Misappropriation of assets
theft of money
Employee theft of intellectual property (IP)
Copyrights, patents, and trade secrets
Employee extortion
Perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim’s interest