Lesson 1 Flashcards

1
Q

For a network intrusion to occur all three legs of the intrusion triangle must exist. These are:

A

Motive
Means
Opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______refers to the characteristic of a communication or any data that ensures the quality of being genuine or not corrupted from the original

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Major roles of ___________ include confirming that the user is who he or she claims to be and ensuring the message is authentic and not altered or forged

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ ___ ___

are used to ensure authenticity of data, transactions, communications or documents.

A
Biometrics
,
smart cards
, or
digital certificates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated

It It is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ and ___ are used to establish authenticity and non-repudiation of a document or message.

A

Digital signatures
and
encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information security deals principally with _________

.

A

risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Once the enterprise’s assets and their corresponding threats have been identified, risk management can take the form of: (4)

A
–
Acceptance
–
Mitigation
–
Transference
–
Avoidance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ (IC3)
is a resource for both victims of Internet crime and the law enforcement agencies investigating and prosecuting these crimes.

A

The Internet Crime Complaint Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The level of security in any system can be defined by the strength of three components:

A

Functionality (Features)

Security (Restrictions)

Usability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Attacks on a System

A

Operating system attacks < Misconfiguration attacks < Shrink wrap code attacks < Application level attacks <

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some of the OS vulnerabilities:

A
–
Buffer overflow
vulnerabilities
–
Bugs in operating
system
–
Unpatched operating
system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This will lead to default code or shrink wrap code attacks.

A

not fine tuning or customizing OS/Application scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______________ is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide

A

A security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Keep in mind that in the end the basic goals for IT security for an organization can be stated as:

A

Maintain the organization’s competitive advantage

Protect the organization’s reputation

Comply with mandates by governmental regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ Specify mandatory rules, regulations, or activities. For
instance, there can be an internal standard specifying that all traffic to a particular destination be encrypted using a certain cryptographic algorithm

_______ Provide recommendations, reference actions, and operational guides for users under circumstances to which standards do not apply
.

A

Standards

Guidelines

17
Q

_______Provide step-by-step instructions for performing specific tasks. Procedures define how policies, standards, and guidelines are implemented within the operating environment.

__________Define the minimum level of security required for a given system type. For example, a list of unnecessary network services that should be disabled on every router provides a baseline of protection

A

Procedures

Baselines