Lesson 1 Flashcards

1
Q

What is the CIA Triad?

A

Confidentiality
Integrity
Availability

Having all three for data information means you have good security. Missing any one of them is a problem for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Confidentiality?

A

Confidentiality - Information has not been disclosed to unauthorized people.

Digital Confidentiality: Public/Private Keys / Encryption Algorithms

When you hear/see “encryption” this is about confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Integrity?

A

Integrity - Information has not been modified or altered without proper authorization.

Only the people who are authorized to to change information able to do so

Think “hashes” when the topic of integrity comes up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability?

A

Availability - Information is able to be stored, accessed, or protected at all times.

Need to be able to store, access and protect information at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three A’s of Security? (AAA)

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Authentication?

A

Authentication - When a person’s identity is established with proof and confirmed by a system.

Real world: Driver’s license proves you are you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Five types of Authentication?

A

Something you know (e.g. password)
Something you are (e.g. fingerprint, facial recognition, etc.)
Something you have (e.g. like a token, a driver’s license, a credit card, etc)
Something you do (e.g. the way you speak, the way you sign your name)
Somewhere you are (e.g. based on your GPS location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Authorization?

A

Authorization - Occurs when a user is given access to a certain piece of data or certain areas of a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Accounting?

A

Accounting - Tracking of data, computer usage, and network resources.

Think: log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Non-Repudiation?

A

Non-Repudiation - When you have proof that someone has taken an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 4 main categories of security threats?

A

(1) Malware - Short for malicious software
(2) Unauthorized Access - Access to computer resources and data without the consent of the owner.
(3) System Failure - when a computer crashes or an application fails
(4) Social Engineering - Manipulating a user into revealing confidential information or performing other detrimental actions. (e.g. phishing, posing as a delivery man)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 Categories for Mitigating Threats

A

(1) Physical Controls
(2) Technical Controls
(3) Administrative (Managerial) Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Physical Controls

A

Physical Controls - alarm systems, locks, surveillance cameras, identification cards, and security guards (real world physical stuff)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Technical Controls?

A

Technical Controls - Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Administrative Controls?

A

Administrative Controls - Policies, Security Awareness Training, contingency planning, disaster recovery plans

Two categories:

(1) Procedural Controls - Company decides to do on its own
(2) Regulatory Controls - Controls required by Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly