Sunflower PDF Flashcards
CIA
Confidentiality, Integrity, Availability
CIA - Negative
Disclosure, Alteration, destruction
Confidentiality
Prevent unauthorized disclosure, need to know, and least privilege. Assurance that information is not disclosed to unauthorized programs, users, processes, encryption, logical and physical access control
Violations - Disclosure - most are a result of human error, oversight, or ineptitude.
Integrity
no unauthorized modifications, consistent data, protecting data or a resource from being altered in an unauthorized fashion. ensures that data is not altered without authorization
Availability
reliable and timely, accessible, fault tolerance and recovery procedures, WHEN NEEDED
IAAA
requirements for accountability.
Identification, Authentication, accountability, Authorization
Identification
user claims identity, used for users access control
Authentication
testing of evidence of users identity
Verifies the claimed identity of system users and is a major function of cryptosystems
Accountability
determine actions to an individual person
Authorization
rights and permissions granted
Privacy
Level of confidentiality and privacy protections.
protecting personal information from disclosure to any unauthorized individual or entity
Risk
Not possible to get rid of all risk. Get risk to acceptable/tolerable level
ISO 27005
risk management frame work
ISO Respnsibilities
Written Products - ensure they are done CIRT - Implement and Operate Security Awareness - Provide leadership Communicate - Risk to higher management Report to as high a level as possible Security is everyone's responsibility
Control Frameworks
Consistent - Approach & application Measurable - way to determine progress Standardized - All the Same Comprehension - examine everything Modular - to help in review and adaptive. layered, abstraction
Due Care
to do all that you could have reasonably done to try and prevent security breach/ compromise / disaster, and took the necessary steps required as countermeasures / controls (safeguards). The benefit of “due care” can be seen as the difference between the damage with or without “due care” safeguards in place. AKA doing something about the threats, failing to perform periodic security audits can result in the perception that due care is not being maintained
Due Diligence
means that the company properly investigated all of its possibly weaknesses and vulnerabilities AKA understanding the threats
What is a man-in-the-middle attack
an attack in which a malicious user is positioned between the the 2 endpoints of a communication’s link
what is a reply attack
a malicious user records the traffic between a client and a server and then retransmits them to the server with slight variations of the timestamp and source ip address. it is similar to hijacking
What is a sniffer attack
Any Activity that results in a malicious user obtaining information about a network or the traffic over that network. Data is captured using a sniffer or protocol analyzer.
What is a spamming attack
Directing floods of messages to a victim’s email inbox or other messaging system. Suck attacks cause DoS issues by filling up storage space and preventing legitimate messages from being delivered
List the security features offered by the Network layer of the OSI model.
The Network layer (layer 3) offers confidentiality, authentication, and integrity.
What are the five generation types of firewalls?
Static packet filtering, application-level gateway, stateful inspection, dynamic packet filtering, and kernel proxy
What is a Proxy
Any system that performs a function or requests a service on behalf of another system. Proxies are most often used to provide clients with Internet access while protecting their identity.