Key words Flashcards
(137 cards)
What does CIA stand for and what is meant by each letter of the CIA?
Confidentiality, Integrity and Availability
What is the meaning of Non - Repudiation?
Non- repudiation is the idea that someone cannot deny the validity of something, or that they cannot dispute responsibility for an action. In information systems, thus can be achieved through hashing and digital signatures amongst other ways. An example of this is when someone sends data, that the third party can verify that it came from the sender.
What is confidentiality of information and how can it be achieved?
Prevent the disclosure of information to unauthorised individuals or systems - Certain information should only be known to certain people
Some of the ways in which this can be achieved are as follows:
Encryption - Encrypt data so only some certain people can read it
Access controls - Restrict access to a resource
MFA - An extra layer of security to prevent unauthorised access to a resource
What is integrity of information and how can it be achieved?
Data cannot be modified without detection - This is to ensure that data received is the data that was sent and that no changes were made - We should be able to identify any modification
Hashing - This involves mapping an arbitrary length of data to data of a fixed length - If data received is different to data sent then the hash of the data would be different
Digital Signature
Certificates
What is availability and how can it be achieved?
Systems & networks must be up and running
Fault tolerance
Redundancy
Patching - Adds stability and closes security holes
What is a digital signature, what is the purpose and how does it work?
This is a hash that has been encrypted with an asymmetrical encryption algorithm. The hash allows us to verify that the data that has been sent has not been changed and the encryption allows us to confirm the person who sent the data - Provides an additional level of integrity in comparison to hashing alone.
What is a Digital Certificate, what is the purpose and how does it work?
What does AAA stand for?
Authentication - Determines if a user, device, or system is allowed to access the network
Authorization - Determines what an authenticated entity can do within the network
Accounting - Measures what a user is doing within a system, what data is accessed, received or sent and the time of these actions - Think logs.
What is a Certificate Authority and provide the names of 3 Root CA’s?
A certificate authority is a company or organization that acts to validate the identities of entities (such as websites, email addresses, companies, or individual persons) and bind them to cryptographic keys through the issuance of electronic documents known as digital certificates.
A digital certificate provides:
Authentication, by serving as a credential to validate the identity of the entity that it is issued to.
Encryption, for secure communication over insecure networks such as the internet.
Integrity of documents signed with the certificate so that they cannot be altered by a third party in transit.
These certificates allow secure, encrypted communication between two parties through public key cryptography. The CA verifies the certificate applicant’s identity and issues a certificate containing their public key. The CA will then digitally sign the issued certificate with their own private key which establishes trust in the certificate’s validity.
What is a GAP analysis and what is it used for?
A gap analysis is the process whereby a company examines their current performance/state vs their desired performance and state. This is then used to map out the required actions needed in order to reach that desired performance/state.
Allows you to work towards a baseline - Could be a cybersecurity framework like NIST CSF or the ISO 27001 or a regulatory requirement ie DORA for finance
What is the principle of Zero Trust?
Zero trust is a security model that treats all users, devices, and components as untrusted by default and requires strict identity authentication and authorization
What is meant by the principal of least privilege?
This is a cybersecurity concept that limits access of users, devices, applications and systems to only what they need to perform their job
What is change management, purpose of it and benefits?
Change management is a structure process that helps companies implement changes as smooth as possible and to ensure that any potential issues can be foreseen as best as possible and that employees are prepared for that change.
What is meant by redundancy?
Ensuring that your systems are redundant can improve availability of systems by ensuring systems can continue to function if something fails because there is a backup or alternative way of executing a specific function
Data redundancy - This would involve creating multiple copies of data to minimising the risk of data loss - Think backups and data replication
Geographic redundancy - Replicating data and applications across multiple locations to ensure systems remain available during a disaster.
Hardware redundancy - Provide backup for important and fault prone components to improve system reliability
Power redundancy - In the case that the main power goes down, main systems can be kept running by using a UPS (uninterruptible power supply)
Automatic Failover - Enable a backup system to automatically takeover if the main system goes down
Regular testing - testing backup systems in order to ensure that these systems can be relied upon if needed
What is the difference between Fault tolerance and redundancy?
Fault tolerance is when the overall system can tolerate the failure of a system whereas redundancy is where a particular function can be performed in more than one way - Redundancy is one way of achieving fault tolerance
What is data obfuscation?
Data obfuscation is the process of disguising confidential or sensitive data to protect it from unauthorized access.
What is steganography?
the practice of concealing messages or information within other non-secret text or data.
What is a threat vector?
A method used by the attacker to gain access to your system - also called an attack vector
What is meant by adaptive identity?
It is an advanced form of authentication that goes beyond traditional methods such as passwords and PINs. Adaptive authentication takes into account contextual information such as location, device, behavior, and risk level to determine whether a user should be granted access or not.
What is PKI?
What is tokenisation and what are some use cases?
What is HIPS?
Host Intrusions Prevention System - A host intrusion prevention system (HIPS) is an approach to security that relies on third-party software tools to identify and prevent malicious activities. Host-based intrusion prevention systems are typically used to protect endpoint devices. Once it detects malicious activity, the HIPS tool can take a variety of actions, including sending an alarm to the computer user, logging the malicious activity for future investigation, resetting the connection, dropping malicious packets and blocking subsequent traffic from the suspect IP address. Some host intrusion prevention systems allow users to send logs of malicious activity and suspicious code directly to the vendor for analysis and possible identification.
What is stateful inspection?
What is stateless inspection?