Intro Flashcards

(35 cards)

1
Q

what does CIA stand for in cyber security

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe C in CIA

A

C stands for confidentiality. Need to make sure data is secure when it is stored, transmitted and when being processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some key components of confidentiality in CIA

A

Need to make sure data is hidden and visible to authorize dusers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how can you enforce confidentiality

A

encryption - not making data available to unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describe I in CIA

A

Data must be accurate and complete and has not been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how is integrity enforced?

A

By hashes : summary or message of original data.- and comparing both hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe A in CIA

A

Availability: making sure data is available as and when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are violation of availability

A

damage web server or slow downs web server . slower down process times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how can availability be enforces

A

By redundancy: covering all bases - install multiple communication link so if some are affected you still have back ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does IAM stand for

A

Idetity and access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does IAAA stand for

A

identification, (name- not authentication), authentication ( proof who you are- ex. secret pin), authorization ( diff levels of access), accountability ( holder is accountable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the I in IAAA

A

Identification: a subject claims and identity e. id badge, retina,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the first A in IAAA

A

Authetication: a subject prooves identity
ex. password, pin or metric data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the phases in an identity lifecycle

A

1st- provisioning - ex. new accounts
2nd review- periodic account reviews- ex. person moves up
3rc- revocation- disable accounts of employee who leaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the types of authentication pass words

A

type 1- password, pin
type 2- mobile, sim , badge
type 3- something that you are- fingerprint, retina

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the best type of authetication

A

multifactor( combines more than 1) _ type 1 and type 2 - ex. password and mobile phone

17
Q

explain types of authentication

A

type 1- something you know
type 2- something u have
type 3 - something u are

18
Q

what is an identity federation

A

provide the relationship so redundant accounts are not created. use credentials from one account to log onto multiple systems /

19
Q

what are token based authentication

A

server will generate token and send to client

20
Q

what is single sign on

A

user logins in once and has access to everything on accounts ( within single organization)

21
Q

what are protocols used i authentication

A

SAML - standar dfor single sign on implementations
oauth- standard for authorization between parties
-OIDC- build on top of oauth , single sign off implementation

22
Q

what are the security governance to ensure decent and securie policies

A

policies, - broad, high level
standard - rukes to achieve intent of policies
procedures and guidelines - specific stesp to acienve consistency - train employes

23
Q

what is PII in security regulation

A

Personally identifuable information - ex. indentify, contact or locate someone

24
Q

what is PHI in security regulatioon

A

protected health information - ex.health information linked to someone

25
what is GDPR regulation
protects general data
26
what is HIPPA regulations
protect healthcare information
27
what is PCI-DSS regulations
PROTECTS CREDIT CARD data
28
how you can protect intellectual property
patentts, trademark, copyrights
29
what is cryptography
the stude andapplication og methods and techniques to protect information by using codes for secure infromation
30
what is cryptography
the study and application of methods and techniques to protect information by using codes for secure communication
31
what are the two main cateogires for cryptography
1- symmetric encryption 2- Asymmetric encrption
32
what is symetric cryptography
it also called private key encryption ( uses same key for encription and decryption -the length determines the strength of the encryption (Ex- AES - Popular encryption algorythim)
33
what is ciphertext
it is encrypted text created after using the secret code for encoding ( think of same key needed)
34
what is asymmetric cyptography
it is a public key cryptography -encrypt document using public key - and destination uses a secret key
35
What happens in hashing
hashing created a fixed sized "summary" to ensure file integrity . an example of hashing digital signatures