OVERVIEW OF SECURITY Flashcards

1
Q

WHAT IS THE CIA TRIAD

A

CONFIDENTIALITY
INTEGRITY
AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CONFIDENTIALITY

A

INFORMATION THAT HAS NOT BEEN DISCLOSED TO UNAUTHORIZED PEOPLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

INTEGRITY

A

INFORMATION THAT HAS NOT BEEN MODIFIED OR CHANGED WITHOUT PROPER AUTHORIZATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT IS THE AAA OF SECURITY

A

AUTHORIZATION
AUTHENTICATION
ACCOUNTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AUTHORIZATION

A

WHEN A USER IS GIVEN ACCESS TO A PIECE OF DATA OR CERTAIN AREAS OF A BUILDING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AUTHENTICATION

A
WHEN A PERSON IS IDENTIFIED BY: 
SOMETHING YOU KNOW
SOMETHING YOU ARE
SOMETHING YOU HAVE 
SOMETHING YOU DO  
SOMEWHERE YOU ARE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ACCOUNTING

A

TRACKING OF DATA, COMPUTER USAGE, AND NETWORK RESOURCES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT IS NON-REPUDIATION

A

WHEN YOU HAVE PROOF THAT SOMEONE AUTHENTICATES SOMETHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT IS MALWARE

A

MALICIOUS SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UNATHORIZED ACCESS

A

WHEN ACCESS TO COMPUTER RESOURCES AND DATA OCCURS WITHOUT THE CONSENT OF THE OWNER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SYSTEM FAILURE

A

WHEN A COMPUTER CRASHES OR APPLICATION FAILS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SOCIAL ENGINEERING

A

ACT OF MANIPULATING USERS INTO REVEALING CONFIDENTIAL INFORMATION OR PERFORMING THER DETRIMENTAL ACTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PHYSICAL CONTROL

A

ALARM SYSTEMS, LOCKS, CAMERAS, ID, GUARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TECHNICAL CONTROLS

A

SMART CARDS, ENCRYPTION, ACCESS CONTROL LISTS (ACL), INTRUSTION DETECTION SYSTEMS, AND NETWORK AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ADMINISTRATIVE CONTROLS

A

USER TRAINING

POLICIES, PROCEDURES, SECURITY AWARENESS, , CONTINGENCY PLANNING, DISASTER RECOVERY PLANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5 TYPES OF HACKERS

A
WHITE HAT
BLACK HAT
GREY HAT
BLUE HAT
ELIT
17
Q

Script Kiddies

A

Baby hackeers that dont know much

18
Q

Hacktivists

A

loose organization that are driven by a cause

19
Q

Organized Crime

A

Crime group that is well funded and sophisticated. In it for the money

20
Q

Advanced Persistent Threats

A

Highly trained and funded group of hackers nation level.