The Full Shabang Flashcards

This is literally everything, all in one place, with as many details as you can possibly cram in. Let's go (19 cards)

1
Q

What is the definition of Confidentiality?

A

Ensures that data is only accessible to those authorised to see it/prevents unauthorised access to private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is Confidentiality implemented?

A

Achieved through:
- Encryption of the data
- Access Controls
- User Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an example of how Confidentiality is implemented?

A

TLS encrypts HTTP data to protect it from eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the definition of Integrity?

A

Ensures that data has not been tampered with/prevents unauthorised modification of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is Integrity implemented?

A

Often implemented using:
- Hashing of data
- Digital Signatures used in connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of Integrity being implemented?

A

A file download might use SHA-256 checksums to verify that the file hasn’t been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the definition of Availability?

A

Ensures that systems, services and data are accessible when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What affects Availability?

A
  • Denial of Service attacks
  • Server failures
  • Overloads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of Availability being compromised?

A

A bank service being taken offline by a DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is non-repudiation?

A

It ensures that a user cannot deny having performed an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is non-repudiation implemented?

A

Implemented using:
- Digital Signatures
- Secure logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of non-repudiation being implemented?

A

Signing an email with a private key ensures that only the key holder could have sent it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the definition of Accountability?

A

Links user actions to specific identities and ensures they can be traced and audited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between non-repudiation and accountability?

A

Non-repudiation - Prevents a party from denying their involvement
Accountability - Involves tracking and linking actions to identities within a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three principles in secure system design?

A

Least Privilege
Fail-safe defaults
Complete Mediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the definition of Least Privilege?

A

Ensures that a user or process has only the minimal permissions necessary to complete their task, reducing the attack surface.

17
Q

What is the definition of fail-safe default?

A

Ensures that access is denied by default, and must be explicitly granted

18
Q

What does Open Design mean in the context of Security?

A

The system should remain secure even if its internal workings are public, relying on secrecy of keys rather than secrecy of design.