Review Flashcards

(48 cards)

1
Q

To protect assets using Prevention, Detection, and recovery

A

The goal of cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication, Non-Repudiation, Confidentiality, and Integrity

A

The attributes/properties provided by cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anyplace entities with different privileges interact.

A

Trust boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A high level statement of what is, and what is not, allowed.

A

A security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity, confidentiality, and availability

A

The 3 pillars of cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A subset of substitution ciphers where a character is substituted for another one a certain characters away. Caesar for example

A

Shift cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security mechanisms are implemented, installed and administered correctly

A

One of the false assumptions of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Read, write and execute

A

The standard unix/ transactional permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user, process or program must be able to access ONLY the information and resources that are necessary for its legitimate purpose

A

The principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vertical and Horizontal

A

The two types of privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The practice of defending computers, servers, mobile devices… from malicious attacks. Also know as information technology or electronic information security

A

Cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The trustworthiness if data or resources. The knowledge that data has not been tampered or altered

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A method, tool or procedure for enforcing a security policy

A

Security mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The concealment of information resources

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To transform or encipher a message or plaintext into ‘an intermediate form’ or ciphertext in which the original information is present but hidden

A

The goal of Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A detailed statement regarding the implementation of a security mechanism

A

A Specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

38% of breaches were reportedly caused by thus type of vulnerability

A

Web Application Vulberability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Uses a single key for both encryption and decryption

A

Symmetric our secret key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Exchange, Storage, and Use

A

The Key Factors of proper Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Revenge, Knowledge, Money, Entertainment, Ego and Cause

A

The 6 common goals/motivators of social engineering

21
Q

Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.

22
Q

The practice of protecting as another person with the goal of obtaining information or access to a person, company or computer system

A

Impersonation

23
Q

The potential for loss, damage, or destruction of an asset as a result of a threat exploring a vulnerability

24
Q

The art or science of skillfully maneuvering human beings to take action in some aspect of their lives

A

Social engineering

25
The unauthorized interception of information and is a form of disclosure
Snooping or eavesdropping
26
A method of encryption where plaintext is shifted so that the ciphertext constitutes a permutation of the plaintext
A Transposition cipher
27
A10 of the OWASP top 10. Warnings and errors generate no, inadequate or unclear log messages that are not properly reviewed
Insufficient logging and monitoring
28
Any sequence of one or more symbols given meaning by specific act(s) of interpretation
Data
29
Uses one key for encryption and another for decryption
Public key or asymmetric encryption
30
Private, hybrid, public
Common deployment models for cloud computing
31
Information that is protected against unwarranted disclosure and should be safeguarded
Sensitive data
32
The process by which potential threats such as vulnerabilities or the absence of safeguards, can be identified, enumerated, and mitigation’s can be prioritized
Threat Modeling
33
A global set of standards for internet security that are recognized best practices for securing IT systems and data against attacks
CIS controls and CIS benchmarks
34
CIS =
Center for Internet Security
35
To make software security visible, so that individuals and organizations are able to make informed decisions
The mission of OWASP
36
Core, Tiers and profile
3 components of cyber security framework
37
Not properly classifying and protecting important data leading to unauthorized access
Sensitive data exposure
38
The individual responsible for monitoring and evaluating the effectiveness of all cyber security measures and processes
The CISO
39
1XX indicates request received, 2 the action was successful, 3xx further action needs to be taken
Server response codes
40
A5 of OWASP, acting as a user without being logged in or ascribe as admin when logged in as user
Broken access control
41
Reflected, Stored, DOM
The types of xss
42
Functions, categories, subcategories, and informative resources
The core of NIST cyber security framework
43
The algorithm that succeeded Diffe-Hellman and is still used today for public key encryption
RSA
44
When software constructs an SQL command using externally influenced input
SQL Injection
45
Categories, Specialty areas, work roles, tasks, KSAs
What are the components of the NICE framework
46
Snooping and eavesdropping is a form of
Disclosure
47
The acceptance of false data is this type of threat category
Deception
48
Permission validation and web session security occurs in the
Logic layer