Security Flashcards

1
Q

the same shared key was used to both encrypt and decrypt the message; faster but we have the key distribution problem - how do 2 parties agree on and share a key if they have never interacted before

A

symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

two mathematically related keys are used; one is a public key that can be shared with everyone and another is a private key that is always kept secret; is slower, but can help with the key distribution problem

A

public-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

function that maps input of any size to an output of fixed size

A

hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a hash function combined with someone’s private key can used to create a _________________

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

issued by a certificate authority (CA) - there are only a few trusted organizations around the world; can be used to prove that your public key actually belongs to you

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when hackers use psychology to trick people into divulging confidential information

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 types of malware

A

virus, worm, trojan horse, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

can insert itself into the code of other computer programs and copy itself throughout the computer and the network when the infected programs run

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is similar to a virus, but it does not need to be attached to another program, and can copy itself without any human help

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

software that appears to be harmless, but actually does something unexpected and malicious behind the scenes. The user has to launce it, and cannot replicate on its own

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

software that will either threaten to publish or prevent the victim from accessing their files unless a ransom is paid. Usually this will be some cryptocurrency so it cannot be traced to the person they paid

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 other techniques than malware

A

phishing, spam, botnet, denial of service attack, sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

use deceptive emails or text messages to social engineer users into revealing sensitive information. Often they will pretend to come form a trusted authority and will ask for confidential information

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unsolicited junk mail

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

collection of computers (usually infected ones) that are used together for a common purpose

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

involves many computers overwhelming a website by requesting a service in an attempt to block others from accessing the website

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

eavesdropping on network communication to obtain sensitive information like passwords, emails, company files, etc.

18
Q

the ____, ____, and ____ that are used to prevent unauthorized access, alteration, theft, interruption, or physical damage of information systems

A

policies, procedures, technical measures

19
Q

are rules and expectations

20
Q

are the step-by-step guides in place

A

procedures

21
Q

are controls to enforce such policies/procedures and to further safeguard information systems

A

technical measures

22
Q

6 types of security services

A

authentication, access control, data confidentiality, data integrity, availability, non-repudiation

23
Q

assurance that the other party is who they say they are

A

authentication

24
Q

prevention of unauthorized use of a resource

A

access control

25
protection of data from unauthorized disclosure
data confidentiality
26
assurance that services are available when needed
availability
27
protection against denial by one of the parties in a communication
non-repudiation
28
wireless security authentication methods
WPS, PSK, EAP
29
very simple measures in place, like pushing the button on your router to join the network
WPS (wifi protected setup)
30
you enter a passphrase to join the network
PSK (pre-shared key)
31
may need to login with a username and password
EAP (Extensible Authentication Protocol) method
32
wireless security protocols
WEP, WPA, WPA2, WPA3
33
can be easily cracked
WEP (Wired Equivalent Privacy)
34
temporarily replacement for WEP
WPA (WIreless Protected Access)
35
very secure, used be eduroam
WPA2
36
newest, introduced in 2018. Even more secure, expected to become more common as it's adopted
WPA3
37
determing points of vulnerability, level of risk, and potential damage if it were to happen
risk assessment
38
identifies main security risks, acceptable security goals, and mechanisms to achieve these goals
security policy
39
states acceptable uses and users of information and computers; establishes things like privacy, user responsibility, personal use of devices, access rules for different employees
acceptable use policy
40
focused on getting the IT systems up and running after a disruption, like restoring backup files, maintaining backup systems, reconfiguring servers etc.
disaster recovery planning
41
focused on getting the business up and running after a disruption. Not just focused in machines, but people too, like coming up with measures to operate after closures due to the pandemic, returning to the office after an evacuation, etc.
business continuity planning
42
investigates if the current security and control framework is adequate; involves a comprehensive assessment of a company's computer security polices, procedures, and technical measures, personnel, training, and documentation
security audit