Security Concepts Flashcards

(31 cards)

1
Q

What are the 3 terms to describe the CIA Triad

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Only authorized individuals have access to information and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Snooping

A

Gathering information that is left out in the open
Mitigation: Clear desk policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dumpster Diving

A

Looking for sensitive documents in the trash
Mitigation: Use a shredder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Eavesdropping attack

A

Listening for sensitive information
Mitigation: Have important meetings in private locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social Engineering

A

Psychological tricks to get access or information
Mitigation: Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wiretapping

A

Monitoring of network traffic
Mitigation: Network traffic encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A

Do not allow unauthorized changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unauthorized modification

A

Attacker makes changes without permission
Mitigation: Least privilege access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Impersonation Attack

A

Attacker pretends to be someone else
Mitigation: User training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Man in the middle

A

Sit in the middle of communication
Mitigation: Traffic Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replay

A

Eavesdrop on logins and reused captured credentials
Mitigation: Traffic Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Availability

A

Protect authorized access to system and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of service

A

Bombarding of system with overwhelming about of information
Mitigation: Firewalls and ISP DDOS protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Power Outage

A

Increased power usage, natural disasters etc
Mitigation: Redundant power supplies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware Failures

A

Equipment can fail occasionally
Mitigation: Build systems with redundancy

17
Q

Destruction of equipment

A

Intentional or accidental damage
Mitigation: Redundancy, backup data centers

18
Q

Service outages

A

Programming errors or underlying equipment.
Mitigation: Resilient systems

19
Q

Identification

20
Q

Authentication

21
Q

Authorisation

A

Access control lists

22
Q

Accounting

A

Logs for user activity

23
Q

Password Rules

A

Length - At least 8 characters
Complexity - digits / special characters
Expiration - Force password changes

24
Q

Password Managers

A

Use of unique strong passwords for each site

25
Something you know
Passwords, pins, security questions
26
Something you are
Fingerprints, voice or face
27
Something you have
Hardware or software tokens, smart cards
28
Single Sign On (SSO)
Shared authentication sessions
29
Non-repudiation
Prevents someone from falsely denying something is true
30
Privacy
Keeping data secure: Personal Identifiable Information Personal Health Information
31
Digital signatures
Provides non-repudiation for messages