WEEK 8 Flashcards
What is CIA
Core principles of information security
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
Confidentiality in CIA is what
It ensured that data is kept private and only accessible to authorized users
(Encryption and Access Control)
Integrity in CIA is what
Ensures the accuracy and trustworthiness of data
(Make sure package is not opened since it was sent out)
Info is not tampered with
Availability in CIA is what
Ensures that data is accessible when needed
(Ability for an IT system to be up and running without interruption)
Confidentiality concerns are what
Snooping
Eavesdropping
Wiretapping
Dumpster Diving
Social engineering
What is Snooping
Am attempt to gain access to information that you are not authorized to view
(Looking at someone else’s phone to get info )
What is Eavesdropping
Secretly listening to the private convo or communication of others without their consent in order to get info
What is Wiretapping
Connecting a listening device to a telephone or data line to secretly monitor a convo
(Bugged phone)
What is Dumpster Diving
Going through someone’s trash to find info that can be used in an attack
What is Social Engineering
Manipulating, influencing, or deceiving a person in order to gain control over a computer or acquire confidential info
Integrity concerns are what
Man-In-The-Middle Attack
Replay Attck
Impersonating
What is Man-In-The-Middle Attack
Sneaky eavesdropper in the middle of a conversation
(Altering the communication between two parties)
What is a Replay Attack
Involves am attacker recording your password or security token when it is send for authentication and then using it later to impersonate you
What is impersonation
When a person impersonates a trusted entity
Availability concerns are what?
Power Outage
Hardware Failure
Destruction
Service Outage
Denial of Service (DoS)
What is a Power Outage
Sudden lost of electricity
What is Hardware Failure
When hardware breaks down
What is Destruction
Human made incidents or natural disasters
What is Service Outage
No signal on your phone
What is Denial of Service (DoS)
An attack that is used to overwhelms system, network, service with an excessive amount of traffic to the point where it breaks
Best practices to secure devices
Antivirus / Anti-Malware
Host Firewall
Changing passwords
Safe Browsing Practices
Up to date updates
What is Antivirus / Anti-Malware
Software designed to detect, prevent, and remove malicious software from computer, or nerwork
What is Signature-based Detection Antivirus
Relies on a database of known malware signatures
Scans files for signatures
(Unique bits of code or characteristics)
What is Behavioral-based (Heuristic) Detection antivirus
Observes the behaviors of programs in real time
It used Heuristics
(Sets of rules to analiza the actions of software)