Foundations of Data Protection and IT Security Flashcards
(39 cards)
What is the difference between Information Security and Cyber Security?
Information Security: is used to secure data in its analogous form.
Cyber Security: tries to protect information that is vulnerable through the use of information and communication technology.
What are the CIA triad of Cyber Security?
Cyber Security is put in place to protect the confidentiality, integrity, and availability of information.
Define Confidentiality in Cyber Security?
It means that information is only made available to those authorized to have access.
What could be the Consequences of an Attack on Confidentiality!
An attack on confidentiality could lead to the unintended disclosure of a customer database that is stored on a cloud storage space.
Define Integrity in Cyber Security?
The maintenance and assurance of the accuracy and completeness of information over its entire life cycle.
Give an example of an Attack on Integrity!
A hacker who, changes marks in a university information system to increase a student’s grades.
Give an example of an Attack on Integrity!
A hacker who, changes marks in a university information system to increase a student’s grades.
Give an example of an Attack on Availability!
distributed denial of service (DDoS), rendering the system unavailable for use.
Give an example of an Attack on Availability!
distributed denial of service (DDoS)
What is Resilience in Cyber Security?
Ensures that systems are built to withstand an attack or outage.
What is Authenticity in Cyber Security?
Ensures that personnel and users are who the say the are.
What is Authenticity in Cyber Security?
Ensures that personnel and users are who the say the are.
What is Non repudiation in Cyber Security?
Means that a person cannot deny having taken action.
What does a structured risk management process, consists of?
- identification of risk,
- analysis of risk,
- mitigation of risk
- reporting risks.
What are the eight cyber security domains according to (ISC)^2?
- security and risk management.
- asset security
- security architecture and engineering.
- communication and network security.
- identity and access management.
- security assessment and testing.
- security operations.
- software development security.
What is the role of Governance in cyber security?
it is used to proactively manage cyber security and implement and monitor necessary controls, but it must also align with the business in relation to the goals of the cyber security program.
What is the role of Governance in cyber security?
it is used to proactively manage cyber security and implement and monitor necessary controls.
What is the role of Risk Management in cyber security?
It helps to identify, assess, and mitigate cyber security risks, as will as implement adequate controls in order to bring risks to a tolerable level.
What is social engineering?
It is an Attack vector that manipulates people into performing actions that could harm an organization.
State some examples of social engineering attacks?
- phishing emails,
- unsolicited phone calls
- impersonation attacks
What makes up a security awareness program?
Awareness, training, and certification
What is Identity and Access Management?
Identity and access management ensures that users in an organization are identified and manages users’ access to resources.
What is IAAA?
“Identification” means that a user states who they are. This can be achieved by typing in a username or stating one’s name at an entrance gate.
“Authentication” is the process where a user shows that they are the individual they claimed to be in step one. This should be done by presenting multiple factors, as one factor could be easily be compromised. There are five different factors:
Something you know: Type 1 authentication (passwords, pass phrase, PIN, etc.)
Something you have: Type 2 authentication (ID, passport, smart card, token, cookie on PC, etc.)
Something you are: Type 3 authentication (biometrics such as a fingerprint, iris scan, facial geometry, etc.)
Somewhere you are: Type 4 authentication (IP/MAC address)
Something you do: Type 5 authentication (signature, pattern unlock)
“Authorization” checks which resources a user has access to. This is done via RBAC, DAC, or MAC and ACLs.
“Accountability” ensures that an audit trail, such as a log, exists. It traces the actions of users and records what they have done to prove their non-repudiation.
State some developments in Firewalls.
First generation firewalls, or packet filter firewalls, inspect each packet and filter it based on specific rules, usually on IP addresses and ports.
Second generation firewalls, or stateful filters, also maintain information based on the connection between two hosts.
Third generation firewalls, or application firewalls, understand certain applications and their vulnerabilities so that they can protect them.
Next generation firewalls (NGFW) can inspect connections on a deeper level. Intrusion Prevention Systems (IPS) learn from the behavior of hosts and network connections so that they can prevent attacks.