Security Flashcards

1
Q

Ensuring that information is viewable only by authorized users or systems, and is either inaccessible or unreadable to unauthorized users.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ensuring that information remains accurate and complete over its entire lifetime. In particular, this means making sure that data in storage or transit can’t be modified in an undetected manner.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ensuring that information is always easily accessible to authorized users. This means making sure that connectivity and performance is maintained at the highest possible level.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The core of information security is commonly summed up into three components, known as the CIA triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The chance of harm coming to an asset

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anything that can cause harm to an asset

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any weakness the asset has against potential threats

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malicious or unwanted software designed to steal data or impair your computer’s performance

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hackers, malicious software, and other automated attacks can try to access your computer over the network to steal data, or implant malware.

A

Network attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A malicious or even negligent user getting access to your account can do damage directly, or just weaken other security measures to make your data more vulnerable

A

Unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Older hardware, software, and network protocols commonly have outdated security features or known vulnerabilities that make them unsafe against modern threats

A

Insecure technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most common vulnerabilities in the enterprise include:

A
Insecure technologies
Weak configurations
Non-compliant systems
Physical environment
User behavior
Weak documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Target vulnerabilities which have not yet been patched, and may not even be known to software vendors

A

zero-day attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Watching someone who is viewing or entering sensitive information, or eavesdropping on confidential conversations

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hunting for discarded documents and other media in a target’s trash, looking for information

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Getting into a secure area by tagging along right behind someone who has legitimate access, with or without their knowledge

A

Piggybacking/Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Impersonating an authority figure or other relevant person over the phone and requesting sensitive information

A

Phone impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Sending unsolicited emails or other electronic messages, with undesired or malicious content

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Using fake but official-looking messages to trick users into performing dangerous actions

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A variant of phishing that targets specific people, such as members of an organization or even individual users

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Malware attached to an infected file, usually an executable program but possibly as a script inside a data file like an office document

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Malware that spreads without any human interaction

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Malware that appears to be a harmless or useful program, like a game or even an anti-virus application

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Any hidden way into a system or application that bypasses normal authentication systems.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Turn the computer into a zombie: part of a large network of computers that performs distributed network attacks or other processing tasks

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Malware that compromises boot systems and core operating system functions in order to hide from most detection methods

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A particularly intrusive sort of malware that attempts to extort money from the victim in order to undo or prevent further damage

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Malware specifically designed to gather information about user and computer activities to send to other parties, often through a backdoor

A

Spyware

29
Q

Malware that delivers advertisements to the infected system, either as pop-ups or within browser or other application windows

A

Adware

30
Q

The attacker tries every possible password or key in a methodical order, until finding the right one

A

Brute force

31
Q

The attacker uses a word list, such as a literal dictionaries or list of common passwords

A

Dictionary attack

32
Q

Many password-based authentication systems rely on cryptographic hashes generated from the password, rather than the password itself

A

Hash table

33
Q

A more popular variety of hash table that’s designed to use less disk space, most effective against short passwords

A

Rainbow table

34
Q

Designed to prevent legitimate users from accessing a network service or an entire network

A

DoS: Denial of service

35
Q

Where a single target is flooded by traffic from many individual computers, often spread across the Internet.

A

DDoS: Distributed denial of service

36
Q

Any attack that intercepts or observes private communications

A

Eavesdropping

37
Q

A form of eavesdropping where an attacker intercepts and relays communications between two points, often impersonating each party in the eyes of the other

A

Man-in-the-middle

38
Q

A technique that falsifies the origin of network communications, either to redirect responses or to trick users into thinking it comes from a trustworthy source

A

Spoofing

39
Q

An attacker giving false replies to DNS requests sent by a host, in order to redirect traffic to a malicious or fraudulent site

A

DNS hijacking

40
Q

A US federal law designed to prevent fraudulent accounting practices. It applies primarily to financial records managed by companies that do business in the United States.

A

SOX: The Sarbanes-Oxley Act of 2002

41
Q

A US law governing health insurance coverage, but from an IT perspective it protects the privacy of patient records. It applies to any organization that stores or handles protected data.

A

HIPAA: The Health Insurance Portability and Accountability Act

42
Q

A newly enacted European Union regulation which protects the privacy of individual data related to EU residents. It applies not only to any organization in the EU which handles personal information, but specifically to foreign organizations that do business with or market to EU residents.

A

GDPR: The General Data Protection Regulation

43
Q

It’s a set of shared rules developed by the world’s major credit card companies and administered by the PCI Council. Part of the contract an organization must sign before it is permitted to process payment cards.

A

PCI DSS

44
Q

Information that can be used to uniquely identify an individual person, either on its own or in conjunction with other information.

A

PII: Personally identifiable information

45
Q

Positive identification of a person or system wishing to initiate communications, for example via a username/password or an ID card.

A

Authentication

46
Q

Specifying the exact resources a given authorized user is allowed to access, such as file permissions on a hard drive.

A

Authorization

47
Q

Auditing and logging the actions of an authenticated user for later review, such as operating system logs tracking logins and accessed files

A

Accounting

48
Q

A list attached to a resource, giving permissions, or rules about exactly who can access it.

A

access control lists ACL

49
Q

Members of this group have full control of the computer, and they can assign user rights and access control permissions to users as necessary

A

Administrators

50
Q

Only found on Domain accounts. Members of this group have full control of computers throughout the domain

A

Domain Admins

51
Q

Members of this group can perform common tasks and run most applications

A

Users

52
Q

In older versions of Windows, members of this group had privileges beyond that of an ordinary user, but less than that of an administrator

A

Power Users

53
Q

Connected to an individual’s health status, medical treatments, and health care payments. Defined by HIPAA, and must be protected by any organization under the jurisdiction of that law

A

PHI: Protected health information

54
Q

A broad set of privacy laws intended to make sure that businesses which make sure consumers are aware of what PII businesses collect about them, and to give them more control over what is collected and how long it is kept.

A

GDPR

55
Q

Regulations apply to any information regarding payment cards issued by major credit card vendors, and the customers that pay using those cards

A

PCI

56
Q

Uses the same key for both encryption and decryption. Also known as private key cryptography since the key must be kept secret for security to be affected

A

Symmetric

57
Q

Uses two mathematically related keys. Data encrypted with the first key can only be decrypted with the second, and vice-versa. Also known as public key cryptography, since typically only one key is kept private and the other is public knowledge.

A

Asymmetric

58
Q

Don’t contain the original data and can’t be reliably reversed. However, since any change to data changes its hash, data can be compared to a stored hash to verify its integrity. Hashes are important in data preservation, authentication, and system integrity checking. Common algorithms include MD5, SHA-1, and the SHA-2 family.

A

Hashing

59
Q

Positive identification of a person or system wishing to initiate communications, for example via a username/password or an ID card.

A

Authentication

60
Q

Specifying the exact resources a given authorized user is allowed to access, such as file permissions on a hard drive

A

Authorization

61
Q

Auditing and logging the actions of an authenticated user for later review, such as operating system logs tracking logins and accessed files.

A

Accounting

62
Q

3 Authentication factors

A

Knowledge
Possession
Inherence

63
Q

Any physical property intrinsic to an individual human body, ranging from fingerprints to DNA to scent

A

Biometrics

64
Q

Examples of Biometrics

A
Fingerprint and palm scanners
Retinal scanners
Iris scanners
Facial recognition
Voice recognition systems
65
Q

A file created and signed using special cryptographic algorithms.

A

Digital certificate

66
Q

Valid for a single session, so can’t be stolen and reused.

A

OTP: A one-time password

67
Q

Any physical device used to aid authentication by containing secret information

A

Hardware token

68
Q

A process that utilizes a communications channel that is separate from the primary communication channel used by two entities trying to establish an authenticated connection.

A

out-of-band authentication