Section 2 Flashcards

1
Q

Explain the difference between a vulnerability and a threat

A

a vulnerability is something that a threat can exploit, while a threat is something that can cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is “security”

A

means protecting your assets, whether from attackers invading your networks, natural disasters, vandalism, loss, or misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are logical assets

A

assets that exist as data or intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is information security

A

protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens when you increase the level of security

A

you usually decrease the level of productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What usually determines the level of security something has

A

how it relates to the value of the item being secured. The cost of the security you put in place should never outstrip the value of what it’s protecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some examples of when you would not be secure

A

Not applying security patches or application updates to your systems

Using weak passwords

Downloading programs from the internet

Opening email attachments from unknown senders

Using wireless networks without encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does confidentiality in the CIA triad mean

A

refers to our ability to protect our data from those who are not authorized to view it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does integrity in the CIA triad mean

A

the ability to prevent people from changing your data in an unauthorized or undesirable manner but also reversing unwanted authorized changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does availability in the CIA triad mean

A

refers to the ability to access our data when we need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Parkerian Hexad model

A

a more complex model that includes the components of the CIA triad but also possession, authenticity, and utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does possession (control) refer to in the Parkerian Hexad model

A

to the physical disposition of the media on which the data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does authenticity refer to in the Parkerian Hexad model

A

allows you to say whether you’ve attributed the data in question to the proper owner or creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does utility refer to in the Parkerian Hexad model

A

how useful the data is to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 4 categories of types of attacks

A

interception, interruption, modification, and fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of attack affects confidentiality in the CIA triad

A

interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of attack affects integrity in the CIA triad

A

interruption, modification, and fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of attack affects availability in the CIA triad

A

interruption, modification, and fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an interception attack

A

allow unauthorized users to access your data, applications, or environments, and they are primarily attacks against confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an interception attack

A

allow unauthorized users to access your data, applications, or environments, and they are primarily attacks against confidentiality. can be conducted against data at rest or in motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an interruption attack

A

make your assets unusable or unavailable to you on a temporary or permanent basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an interruption attack

A

make your assets unusable or unavailable to you on a temporary or permanent basis. mostly affect availability but can affect integrity as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a modification attack

A

involves tampering with an asset or altering data. mostly attacks on integrity but also availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a fabrication attack

A

involve generating data, processes, communications, or other similar material with a system. primarily affect integrity but could affect availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a “threat”

A

something that has the potential to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are “vulnerabilities”

A

weaknesses, or holes, that threats can exploit to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is “risk”

A

the likelihood that something bad will happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is “impact”

A

takes into account the value of the asset being threatened and uses it to calculate risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the steps of risk management

A

identify assets, identify threats, assess vulnerabilities, assess risks, mitigate risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are “controls”

A

putting measures into place to mitigate risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are “controls” and what are the different types

A

putting measures into place to mitigate risk. physical, logical, and administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are physical controls

A

protect the physical environment in which your systems sit, or where you data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are logical controls

A

sometimes called technical controls, protect the systems, networks, and environments that process, transmit, and store data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are administrative controls

A

based on rules, laws, policies, procedures, guidelines, and other items that are “paper” in nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does the incident response process consist of

A

preparation, detection and analysis, containment, eradication, recovery, and post incident activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the preparation phase in the incident response process

A

consists of all the activities you can perform ahead of time to better handle an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the detection and analysis phase in the incident response process

A

you detect an issue, decide whether
it’s actual an incident and respond to it appropriately

38
Q

What is the containment, eradication, and recovery phase in the incident response process

A

Containment involves taking steps to ensure that the situation doesn’t cause any more damage than it already has - or at least lessen any ongoing harm.

Eradication is removing the effects of the issue from your environment

Recovery involves restoring devices or data from backup media, rebuilding systems, or reloading applications

39
Q

What is “defense in depth”

A

a strategy in which to formulate a multilayered defense that will allow you to still mount a successful resistance should one or more of your defensive measures fail

40
Q

What is the goal of defense in depth in an information security setting

A

to place enough defensive measures between your truly important assets and the attacker so that you’ll notice than an attack is in progress and have enough time to prevent it

41
Q

What are the layers of defense in depth from inward to outward

A

data, application, host, internal network, external network

42
Q

What is identification and authentication

A

identification makes a claim about what someone or something is, and authentication establishes whether this claim is true

43
Q

What is identity verification and how is it different from authentication

A

requesting credentials for proving identity. authentication is different because it is determining if it is true or not

44
Q

What is authentication

A

the set of methods used to establish whether a claim of identity is true.

45
Q

What is multifactor authentication

A

one or more factors. when you are only using 2, it is called two-factor authentication

46
Q

Name the factors for authentication

A

something you know, something you are, something you have, something you do, where you are

47
Q

What is mutual authentication

A

an authentication mechanism in which both parties in a transaction authenticate each other. the client authenticates to the server and the server authenticates to the client often relying on digital certificates

48
Q

What is a man-in-the-middle attack

A

the attacker inserts himself between the client and the server. The attacker then impersonates the server to the client and the client to the server.

49
Q

What are 3 common identification and authentication methods

A

passwords, biometrics, and hardware tokens

50
Q

What 7 characteristics are biometrics defined by

A

universality, uniqueness, permanence, collectability, performance, acceptability, circumvention

51
Q

What is uniqueness in biometrics

A

a measure of how unique a characteristic is among individuals.

51
Q

What is universality in biometrics

A

means you should be able to find your chosen biometric characteristic in the majority of people you expect to enroll in the system

52
Q

What is permanence in biometrics

A

tests how well a characteristic resists change over time and with advancing age

53
Q

What is collectability in biometrics

A

measures how easy it is to acquire a characteristic

54
Q

What is performance in biometrics

A

measures how well a given system functions based on factors such as speed, accuracy, and error rate

55
Q

What is acceptability in biometrics

A

a measure of how acceptable the characteristic is to the users of the system

56
Q

What is circumvention in biometrics

A

describes how easy it is to trick a system by using a falsified biometric identifier.

57
Q

What is the false acceptance rate (FAR) in biometrics

A

measures how often you accept a user who should be rejected. also called a false positive

58
Q

What is the false rejection rate (FRR) in biometrics

A

measures how often we reject a legitimate user and is sometimes called a false negative.

59
Q

What is the equal error rate (EER) in biometrics

A

a balance between the 2 error types. If you plot both the FAR and the FRR on a graph, the EER marks the point where the two lines intersect. EER is a measure of accuracy in biometric systems

60
Q

What is authorization

A

the process of determining exactly what an authenticated party can do.

61
Q

What are access controls

A

the tools and systems you use to deny or allow access.
You can base access controls on physical attributes, sets of rules, lists of individuals or systems, or other, more complex factors.

62
Q

What is allowing access when relating to access control

A

giving a party access to a given resource.

63
Q

What is denying access when relating to access control

A

preventing a given party from accessing the resource in question.

64
Q

What is limiting access when relating to access control

A

allowing only some degree of access to your resources. In a physical security scheme, you might have a master key that can open any door in the building, an intermediate key that can open only a few doors, and a low-level key that can open only one door. You might also implement limited access when you’re using applications that may be exposed to attack-prone environments, like web browsers used on the internet.

65
Q

What is revoking access when relating to access control

A

taking access away from a party after you’ve granted it.

66
Q

What is an access control list (ACL)

A

lists containing information about what kind of access certain parties are allowed to have to a given system.

67
Q

What is a “socket”

A

the combination of both an IP address and a port

68
Q

What is the “confused deputy problem” attack

A

when the software with access to a resource (the deputy) has a greater level of permission to access the resource than the user who is controlling the software. If you can trick the software into misusing its greater level of authority, you can potentially carry out an attack

69
Q

What is cross-site request forgery (CSRF)

A

an attack that misuses the authority of the browser on the user’s computer. If the attacker knows of, or can guess, a website that has already authenticated the user—perhaps a common site such as Amazon.com—the attacker can embed a link in a web page or HTML-based email, generally to an image hosted from a site controlled by the attacker. When the target’s browser attempts to retrieve the image in the link, it also executes the additional commands the attacker has embedded in it, often in a fashion completely invisible to the target.

70
Q

What is “user interface redressing” also know as “clickjacking”

A

client-side attack that takes advantage of some of the page rendering features that are available in newer web browsers. To carry out a clickjacking attack, the attacker must legitimately control or have taken control of some portion of a website. The attacker constructs or modifies the site by placing an invisible layer over something the client would normally click. This causes the client to execute a command that’s different than the one they think they’re performing.

71
Q

What is an access control model and what are the 2 main types

A

a way of determining who should be allowed access to what resources.

discretionary access control (DAC)

mandatory access control (MAC)

72
Q

What is the DAC model

A

the owner of the resource determines who gets access to it and exactly what level of access they can have.

73
Q

What is the MAC model

A

the owner of the resource doesn’t get to decide who gets to access it. Instead, a separate group or individual has the authority to set access to resources.

74
Q

What is the principle of least privilege

A

dictates that you should give a party only the bare minimum level of access it needs to perform its functionality.

75
Q

What is rule-based access control

A

allows access according to a set of rules defined by the system administrator. If the rule is matched, access to the resource will be granted or denied accordingly.

76
Q

What is role-based access control (RBAC)

A

allows access based on the role of the individual being granted access. For example, if you have an employee whose only role is to enter data into an application, RBAC would mandate that you allow the employee access to only that application.

77
Q

What is attribute-based access control (ABAC)

A

based on the specific attributes of a person, resource, or environment. “subject attributes” belong to an individual such as being able to complete a CAPTCHA
“resource attributes” belong to a resource, such as an operating system or application.
“environmental attributes” enable access controls based on environmental conditions.

78
Q

What are multilevel access control models

A

combine several of the access control models for more security

79
Q

What is the Bell-LaPadula model

A

A multilevel access control model that places an emphasis on confidentiality and consists of 2 properties-

The Simple Security Property - The level of access granted to an individual must be at least as high as the classification of the resource in order for the individual to access it. In other words, an individual cannot read a resource classified at a higher level, but they can read resources at a lower level.
The * Property (or Star Property) - Anyone accessing a resource can only write (or copy) its contents to another resource classified at the same level or higher.

80
Q

What is the Biba model

A

a multilevel access control model that places an emphasis on integrity of data and consists of 2 properties-

The Simple Integrity Axiom - The level of access granted to an individual must be no lower than the classification of the resource. In other words, access to one level does not grant access to lower levels.
The * Integrity Axiom (or Star Integrity Axiom) - Anyone accessing a resource can only write its contents to a resource classified at the same level or lower.
We can summarize these rules as “no read down” and “no write up,” respectively. This means that assets that are of high integrity (meaning they shouldn’t be altered) and assets that are of low integrity are kept strictly apart.

81
Q

What is the brewer and nash model

A

a multilevel access control model designed to prevent conflicts of interest. considers 3 main resource classes-

access is determined dynamically based on materials previously accessed

Objects: Resources, such as files or information, pertaining to a single organization
Company groups: All objects pertaining to an organization
Conflict classes: All groups of objects concerning competing parties

82
Q

What is auditing?

A

the process of reviewing an organization’s records or information.

83
Q

What is nonrepudiation

A

refers to a situation in which an individual is unable to successfully deny that they have made a statement or taken an action, generally because we have sufficient evidence that they did it.

84
Q

What is a ‘clipping level’ when monitoring logs

A

a predefined threshold in system security monitoring that determines how many identical events or incidents can occur before they are considered a potential security issue.

85
Q

What are “assessments” in security audits and what are the different types

A

tests that find and fix vulnerabilities before any attackers do.

two approaches to this: vulnerability assessments and penetration testing.

86
Q

What are vulnerability assessments

A

involve using vulnerability scanning tools, such as Qualys, to locate weaknesses in an environment.

87
Q

What is penetration testing

A

you mimic the techniques an actual attacker would use to breach a system. You may attempt to gather additional information on the target environment from users or other systems in the vicinity, exploit security flaws in web-based applications or web-connected databases, or conduct attacks through unpatched vulnerabilities in applications or operating systems.

88
Q

What is the purpose of ensuring accountability in security

A

to make people responsible for their actions. is a good deterrent

89
Q

What does the Business Software Alliance (BSA) do

A

It regularly audits other organizations to ensure that they’re complying with software licensing.