R10 Flashcards

(38 cards)

1
Q

What are the components of the CIA Triad?

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Confidentiality ensure?

A

Data is only accessible to authorised users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Integrity ensure?

A

Data remains accurate and unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Availability ensure?

A

Systems and data are accessible when needed by authorised users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the components of the IAAA Model?

A

Identification
Authentication
Authorisation
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Identification in IAAA?

A

Recognising a user/system via unique identifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Authentication in IAAA?

A

Verifying identities through methods like passwords or biometrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Authorisation in IAAA?

A

Granting users specific access rights to resources based on their identity and role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Accountability in IAAA?

A

Tracking and logging users’ actions to ensure responsibility and traceability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some Non-Technical Threats:

A

S – Social Engineering
P – Physical
I – Insider
E – Environmental
S – Social Media
D – Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Physical Threat?

A

Risk to physical assets (e.g., theft, break-ins).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Social Engineering?

A

Tricking people into revealing sensitive info (e.g., phishing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some Technical Threats:

A

C – Cracking
H – Hacking
A – APTs
M – Malware
M – Misuse
E – Errors
D – Data Leakage
D – DDoS
M – Mobile Threats
C – Cloud Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Hacking?

A

Unauthorised access to damage or steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Malware?

A

Harmful software designed to damage or steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a DDoS attack?

A

Overloading a server with traffic to disrupt service.

17
Q

What is MFA (Multi-Factor Authentication)?

A

Combining multiple verification methods (e.g., password + fingerprint).

18
Q

What is PKI? (Public Key infrastructure)

A

A system using public/private keys to secure communication.

19
Q

What is a Public Key in PKI?

A

Shared key used to encrypt data.

20
Q

What is a Private Key in PKI?

A

Secret key used to decrypt data or sign documents.

21
Q

What is a Certificate Authority (CA)?

A

An entity within PKI that verifies and issues digital certificates to authenticate their public keys.

22
Q

What does a Router do?

A

Connects multiple devices to a network and directs traffic between them.

23
Q

What does a Switch do?

A

Connects devices within a LAN.

24
Q

What is a Firewall?

A

Security device used to block unauthorised access to a network.

25
Name three network topologies:
Star - All devices connect to a central switch Mesh - Devices are interconnected for redundancy Hybrid - Combination of different topologies
26
What is Cryptography?
The practice of securing information through encoding.
27
What is Encryption?
Converting plaintext into ciphertext.
28
What is Decryption?
Converting ciphertext back into plaintext.
29
What is a Symmetric Key?
A single key used for both encryption and decryption.
30
What is an Asymmetric Key?
Uses 2 separate keys: Public key encrypts, private key decrypts.
31
What is Hashing?
One-way conversion of data into a fixed-length string
32
What are White Hat Hackers?
Ethical hackers testing systems for vulnerabilities
33
What are Black Hat Hackers?
Malicious hackers exploiting systems for personal gain.
34
What is a SQL Injection?
Inserting a malicious code into a database to manipulate or extract data.
35
What is a Man-in-the-Middle (MITM) Attack?
Intercepting and potentially altering communication between two parties.
36
What is Ransomware?
Malware that locks data and demands payment for decryption.
37
What is a digital signature?
Confirms data authenticity and integrity using asymmetric encryption.
38
What is the purpose of a Digital Signature?
To verify the authenticity and integrity of digital documents.