Mod 1 Flashcards

(28 cards)

1
Q

Define security

A

A state of freedom from a danger or risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 security dimensions? (C.I.A)

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define confidentiality

A

information in the system that may be disclosed to unauthorized party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define integrity

A

the data received has to be the original data intended and has not been manipulated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define availability

A

information and computing resources can be obtained according to a quality service definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the tools for confidentiality?

A

Encryption
Access control
Authentication
Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define encryption

A

transformation of information using a secret encryption key so that it can only be read using the same decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define access control

A

rules and policies that limit access to confidential information to those who need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define authentication

A

a determination of identity based on a combination of
- something the actor has (keys)
- something the actor knows (passwords)
- something the agent is (biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define authorization

A

a determination if an actor is allowed access to resources based on an access control policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the tools for integrity?
(3)

A

Backups
Checksums
Data Correcting Codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the tools for availability?

A

Physical protections
Computational redundancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define asset

A

something of value which has to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define attack / exploit

A

an abuse of a system’s vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define control

A

mitigation measure that reduces a system’s vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define exposure

A

possible loss or harm to a computing system

17
Q

Define threat

A

circumstances that have potential to cause loss or harm

18
Q

Define vulnerability

A

a weakness in a computer system that may be expoited to cause loss or harm

19
Q

Define risk

A

the likelihood that a threat agent will exploit a vulnerability

20
Q

What are the 4 goals of security policies?

A

Identify organizational assets that need protecting
Define the level of protection/recovery needed for different assets
Define responsiblilities of individuals
Include security procedures & technologies to be maintained

21
Q

Give examples of the different scopes/tiers of a security policy (3)

A

Global - addresses everyone and everything
Specific topic - addresses special issues of current relevance
App specific - addresses a specific app/function/system

22
Q

Give examples of security policies

A

Acceptable Use Policy
Security-Related Human Resource Policy
Password Management Policy
Personal Identifiable Information Policy
Disposal and Destruction Policy
Classification of Information Policy
Ethics Policy

23
Q

What does an Acceptable Use Policy define?

A

Actions a user may perform while accessing systems and networking equipment, as well as explicit prohibitions regarding security

24
Q

What is generally considered to be the most important information security policy?

A

Acceptable Use Policy

25
What does a Security-Related Human Resource Policy entail?
Information about technology resources and how they should be used, and the due process should anyone break the AUP
26
Which policy sets the rules for, and how frequently passwords must be changed?
Password Management Policy
27
What issues are addressed in a Disposal and Destruction Policy?
How long records and data are retained. How to dispose of confidential resources.
28
What's the purpose of Classification of Information Policies (CIP)?
to produce a standardized framework for classifying information assets