IAS Flashcards

(107 cards)

1
Q

is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation

A

Information Assurance (IA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

study on how to recover should any of those happen.

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 aspects of information needed protection

A

Availability, Integrity, Confidentiality, Authentication, Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

timely, reliable access to data and information services for authorized users;

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protection against unauthorized modification or destruction of information;

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

assurance that information is not disclosed to unauthorized persons;

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security measures to establish the validity of a transmission, message, or originator.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

assurance that the sender is provided with proof of a data delivery

A

Non- repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: IT security cannot be accomplished in a vacuum

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Four Major categories of Information Assurance

A

Physical Security, personnel security, IT security, Operational Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

refers to the protection of hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services and loss of assets.

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

6 Proper Practice of Information Assurance

A

-enforcing hard-to-guess passwords
- encrypting hard drives
- locking sensitive documents in a safe
- assigning security clearances to staffers
- using SSL for data transfer
- having off-site back up of documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a variety of ongoing measures taken to reduce the likelihood and severity of accidental and intentional alteration, destruction,

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

action or inaction by insiders and known outsiders, such as business partners.

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is the inherent technical features and functions that collectively contribute to an IT infrastructure

A

IT security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

involves the implementation of standard operational security procedures

A

Operational Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purpose of operational security

A

achieve and sustain a known secure system state at all times
-prevent accidental or intentional theft, release, destruction, alteration, misuse, or sabotage of system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

According to _________, a computing environment is made up of five continuously interacting components

A

Raggad’s taxonomy of information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 continuously interacting components

A

activities, people, data. technology and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

According to ______, IA can be thought of as protecting information at three distinct levels

A

Blyth and Kovacich

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

3 distinct levels

A

Physical
-information infrastructure
- perceptual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

data and data processing activities in physical space;

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

information and data manipulation abilities in cyberspace;

A

information infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

knowledge and understanding in human decision space.

A

Perceptual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
What is the lowest level focus of IA?
Physical Level
25
Computers, physical networks, telecommunications and supporting systems such as power, facilities and environmental controls
Physical Level
26
At this level people are the one who manage the systems.
Physical Level
27
to affect the technical performance and the capability of physical systems, to disrupt the capabilities of the defender.
Desired effects(Physical level)
28
physical attack and destruction, including: electromagnetic attack, visual spying, intrusion, scavenging and removal, wiretapping, interference, and eavesdropping.
Attackers Operations ( Physical level)
29
physical security, OPSEC, TEMPEST
Defenders Operations ( Physical Level)
30
COMPSEC meaning:
Computer security
31
COMSEC:
Communications and network security
32
ITSEC
both COMPSEC and COMSEC
32
What is the second level focus of IA?
Infrastructure level
33
OPSEC
operations security
34
 This covers information and data manipulation ability maintained in cyberspace, including: data structures, processes and programs, protocols, data content and databases.
Infrastructure Level
35
to influence the effectiveness and performance of information functions supporting perception, decision making, and control of physical processes.
Desired effects ( IL)
36
impersonation, piggybacking, spoofing, network attacks, malware, authorization attacks, active misuse, and denial of service attacks.
Attackers Operation (IL)
37
information security technical measures such as: encryption and key management, intrusion detection, anti-virus software, auditing, redundancy, firewalls, policies and standards.
Defenders Operation (IL)
38
What is the third level of IA?
Perceptual Level
39
 This is abstract and concerned with the management of perceptions of the target, particularly those persons making security decisions.
Perceptual Level
40
to influence decisions and behaviors
Desired effects ( PL)
41
psychological operations such as: deception, blackmail, bribery and corruption, social engineering, trademark and copyright infringement, defamation, diplomacy, creating distrust.
Attackers Operation (PL)
42
personnel security including psychological testing, education, and screening such as biometrics, watermarks, keys, passwords
Defenders Operation (PL)
43
It is the flip side of information assurance
Information Warfare
44
involves managing an opponent’s perception through deception and psychological operations. In military circles, this is called Truth Projection.
TYPE I
45
gathers intelligence by exploiting the opponent’s use of information systems.
TYPE III
45
involves denying, destroying, degrading, or distorting the opponent’s information flows to disrupt their ability to carry out or coordinate operations.
TYPE II
46
6 offensive players of IW
Insiders, Hackers, Criminals, Corporations, Government and terrorists
47
consists of employees, former employees and contractors.
Insiders
48
one who gains unauthorized access to or breaks into information systems for thrills, challenge, power, or profit.
Hackers
49
target information that may be of value to them: bank accounts, credit card information, intellectual property, etc.
Criminals
50
actively seek intelligence about competitors or steal trade secrets.
Corporations
51
seek the military, diplomatic, and economic secrets of foreign governments, foreign corporations, and adversaries. May also target domestic adversaries.
Government and agencies
52
usually politically motivated and may seek to cause maximal damage to information infrastructure as well as endanger lives and property.
Terrorists
53
Protection Pillars f IA
“ensure the availability, integrity, authenticity, confidentiality, and non-repudiation of information”
54
IA is both proactive and reactive involving
protection, detection, capability restoration, and response.
55
“timely attack detection and reporting is key to initiating the restoration and response processes.”
Attack Detection
56
“relies on established procedures and mechanisms for prioritizing restoration of essential functions.
Capability Restoration
57
may rely on backup or redundant links, information system components, or alternative means of information transfer.”
Capability Restoration
58
the resource being protected, including: physical assets: devices, computers, people; logical assets: information, data (in transmission, storage, or processing),
Asset
59
the items being protected by the system (documents, files, directories, databases, transactions, etc.)
Objects
60
entities (users, processes, etc.) that execute activities and request access to objects.
Subjects
61
operations, primitive or complex, that can operate on objects and must be controlled
Actions
61
7 Critical Aspects: Information assets (objects) may have critical aspects:
Availability, accuracy, authenticity, confidentiality, integrity, utility, possession
61
in the Unix operating system, processes (___) may have permission to perform read, write or execute (____) on files (__)
Subjects, actions, objects
62
authorized users are able to access it;
Availability
63
the information is free of error and has the value expected
Accuracy
64
the information is genuine;
Authenticity
65
the information has not been disclosed to unauthorized parties;
Confidentiality
66
the information is whole, complete and uncorrupted;
Integrity
67
the information has value for the intended purpose;
utility
68
the data is under authorized ownership and control.
possession
69
may be conducted by criminals, but also by states for industrial espionage, for economic damage to apply pressure, or to inflict real damage to infrastructure as an act of war
Cyber Attack
70
requires some form of physical security, since physical access to computer systems enables a whole class of attacks.
Cybersecurity
71
is the protection of computer systems from the damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Computer Security or IT security
72
may depend on cybersecurity to the extent that it uses computer systems
Physical Security
73
is concerned with the absence of misbehavior, both in normal and exceptional situations, but still in a neutral environment when no one is trying to intentionally attack the system
Software safety
74
aims for the absence of misbehavior in an adversarial environment,
Safety
74
aims for the absence of misbehavior in an adversarial environment, where an attacker intentionally tries to misuse a system, putting it in an erroneous state that is not part of its intended specification
Software security
75
where an attacker intentionally tries to misuse a system
Security
76
is an essential cornerstone in a digital world which increasingly pervades every aspect of our daily lives, public and private. Without it, the world collapses.
Security
76
ability for individuals to control their personal data and decide what to reveal to whom and under what conditions.
Privacy
76
CIA Triad stands for?
Confidentiality, Integrity, and Availability
77
Cybersecurity consists in ensuring three basic and essential properties of information, services, and IT infrastructures well known as the?
CIA triad
77
confidentiality of the identity of the user or entity
Anonymity
78
a set of rules that specify how sensitive and critical resources are protected, i.e., how some or all of the previous properties are guaranteed.
Security Policy
78
initially defined as the ability of a system to return to its original state after an attack
Resilience
79
related to scientific methods of identifying the authors of a crime by examining objects or substances involved in the crime.
Forensic Analysis
79
aims to explain the state of a computing system by extracting information and using it to reconstruct the series of actions undertaken by the attacker
Forensic Analysis
80
has been given to practices where governments or governmental organizations perform surveillance and data collection at a national scale (or larger)
Mass Dataveillance
81
targets an individual of (supposed) interest.
Personal Dataveillance
82
are physical attacks based on the observation of the circuit behavior during a computation
Side Channel analysis
83
a well-known class of physical attacks where a device undergoes a modification of physical parameters in order to obtain an incorrect behavior
Fault Attacks
84
can also be generated in multicore SoC using the Dynamic Voltage and Frequency Scaling (DVFS), i.e
Perturbation
85
attacking this basic and essential network service can, for instance, isolate a whole country or at the opposite redirect all the traffic of a country through a surveillance point. Another crucial network service, DNS, translates readable hostnames into IP addresses. An attack against this service can redirect a user to a fake banking web site in order to steal the user’s credentials
Routing
86
s a hierarchical decentralized naming system for the Internet, with scalability and flexibility as key design goals.
Domain Name System(DNS)
87
used for address resolution,i.e., hostname to IP mapping (e.g., “www.example.com” resolves to IPv4 address “1.2.3.4”), as well as the inverse mapping.
DNS
88
Type of routing thtat controlled by a single organization
Autonomous System
89
is the protocol currently in use on the Internet for the exchange of routing and reachability information among autonomous systems.
Border Gateway Protocol
90
more advanced and leveraging higher social intelligence to make people confident in the legitimacy of the request they received
Spear Phishing
91
aims at convincing the user to perform an action, such as revealing a password, by gaining their trust.
Social Engineering
92
usually aims at obtaining information like passwords, credit card numbers etc. It is often based on massive email campaigns (spam) or messages over other communication media (chats, social media) requesting that people provide sensitive information either by replying to the email or by connecting to a website
Phishing
92
convince a person to perform a forbidden or sensitive action by gaining their trust
Social Engineering
93
aims at flipping memory bits while reading and writing another cell.
Rowhammer Attack
94
94