WEEK 8 Flashcards

1
Q

What is CIA

A

Core principles of information security

CONFIDENTIALITY
INTEGRITY
AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality in CIA is what

A

It ensured that data is kept private and only accessible to authorized users

(Encryption and Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity in CIA is what

A

Ensures the accuracy and trustworthiness of data

(Make sure package is not opened since it was sent out)

Info is not tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability in CIA is what

A

Ensures that data is accessible when needed

(Ability for an IT system to be up and running without interruption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality concerns are what

A

Snooping
Eavesdropping
Wiretapping
Dumpster Diving
Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Snooping

A

Am attempt to gain access to information that you are not authorized to view

(Looking at someone else’s phone to get info )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Eavesdropping

A

Secretly listening to the private convo or communication of others without their consent in order to get info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Wiretapping

A

Connecting a listening device to a telephone or data line to secretly monitor a convo

(Bugged phone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Dumpster Diving

A

Going through someone’s trash to find info that can be used in an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Social Engineering

A

Manipulating, influencing, or deceiving a person in order to gain control over a computer or acquire confidential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity concerns are what

A

Man-In-The-Middle Attack
Replay Attck
Impersonating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Man-In-The-Middle Attack

A

Sneaky eavesdropper in the middle of a conversation

(Altering the communication between two parties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Replay Attack

A

Involves am attacker recording your password or security token when it is send for authentication and then using it later to impersonate you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is impersonation

A

When a person impersonates a trusted entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Availability concerns are what?

A

Power Outage
Hardware Failure
Destruction
Service Outage
Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Power Outage

A

Sudden lost of electricity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Hardware Failure

A

When hardware breaks down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Destruction

A

Human made incidents or natural disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Service Outage

A

No signal on your phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Denial of Service (DoS)

A

An attack that is used to overwhelms system, network, service with an excessive amount of traffic to the point where it breaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Best practices to secure devices

A

Antivirus / Anti-Malware
Host Firewall
Changing passwords
Safe Browsing Practices
Up to date updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Antivirus / Anti-Malware

A

Software designed to detect, prevent, and remove malicious software from computer, or nerwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Signature-based Detection Antivirus

A

Relies on a database of known malware signatures
Scans files for signatures
(Unique bits of code or characteristics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Behavioral-based (Heuristic) Detection antivirus

A

Observes the behaviors of programs in real time
It used Heuristics
(Sets of rules to analiza the actions of software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a Host Firewall
Protects an individual device by monitoring and controlling incoming and outgoing network traffic
26
What are some thing to do when web browsing
Stick to trusted sites Keep browsers up to date Stay on supported browsers Enable notifications when downloading something
27
Device use best practices
Software screening User Account Control (UAC) Remove unwanted or unused software
28
What is User Account Control (UAC)
Utility in windows that protect your device from malicious downloads
29
What is Software Screening
What you analyze the application you are downloading to make sure it’s trustworthy
30
What are the Expectations of Privacy
Application may still have data that has been kept private Emails can still be read by authorities at any point File servers can show your IP and can see content of the file Instant messaging can be leaked too Locations from apps can be leaked
31
What is a policy
A set of rules that dictate what action should be taken under various circumstances (Acceptable use policy Non disclose-sure agreement )
32
What is a Non-Disclosure Agreement (NDA)
Legal contract that tells you what u can and can’t say to who
33
What is a Procedure
A step-by-step instructions to preform a task (Standard Operating Procedure)
34
What is Standard Operating Procedures (SOP)
Detailed written set of procedures that explain how to undertake a particular activity
35
What is confidential Information
Data that should not be shared to unauthorized person (passwords, credit card data, etc..)
36
Ways to protect confidential Information
Store it securely Encryption Never share it Good passwords
37
What is Personal Identifiable Information (PII)
Any information that can be used to identify an individual Name Social Security Number Date of Birth Email Address Phone Number
38
What is Protected Health Information (PHI)
Any information about an idividual's health status. Medical Records Healthcare Services
39
What is AAA
Authentication Authorization Accounting (Verifies and manages users Identities)
40
What does Authentication mean in AAA
Makes sure its you who is trying to log in
41
What does Authorization mean in AAA
Determines what you can and can't do
42
What does Accounting mean in AAA
It tracks user activities and logs them
43
What are some ways that Authentication proves its you
Something You Know (password, PIN, security questions) Something You Have (Hardware Token, Software Token, One-Time Password) Something You Are (Biometrics, Fingerprint, Eye scan, Face scan) Somewhere You Are (Certain Location)
44
What is Single-Factor
Verifies your identity only using one piece of evidence (just password or just a finger scan)
45
What is Multi-factor
Requires 2 or more authentication practices to verify its you (password , finger scan, and hardware token )
46
2 Factor Authentication
Uses EXACTLY 2 authentication factors to verify its you (password and mobile code)
47
What is Single Sign-On (SSO)
A user authentication service that permits a user to use one set of login credentials like username and password to access MULTIPLE applications (if you leave then the next time you try to login you will need to authenticate again)
48
What are Permissions
The specific right or privileges granted to users or software
49
What are Least Privilege
Giving users or systems only the permissions they absolutely need to perform a task or job function and nothing more
50
Role-Based Access Control (RBAC)
Only a certain type of department will have access to a certain type of files (Roles and job titles) (IT can see those files but others at work cant)
51
Rule-Based Access Control
Has rules on how they have permissions (Example Rule 1. only get permissions when at work)
52
Mandatory Access Control (MAC)
Uses labels and classifications to determine access
53
Discretionary Access Control (DAC)
When the owner of the info decides who gets permissions
54
What are Logs
Records that provide a chronological account of events in a system (logins, file accesses, system errors, security breaches) (digital footprints left behind on a system) (silent guardians)
55
What us Non-Repudiation
A safeguard that guarantees individuals or entities involved in a digital transaction cannot later refute or deny their participation of their actions (ensuring that they cant say "I DIDNT DO THAT") (videos, fingerprint, digital signature, recipe)
56
What are passwords best practices
Password length (longer is better) Must meet complexity (need characters like *&@!$) Not to reuse the same password Password expiration date Password lock out after certain attempts Avoid using password for all accounts
57
What is Plain Text
Normal text that is readable by anyone (Hasn't gone trough encryption)
58
What is Cipher Text
Encrypted text that is not readable by anyone
59
To make Cipher Text into Plain Text you do what
Decryption (need a specific key to do this)
60
What is Data at Rest
Data stored on devices that is not actively being used or transmitted (files sitting in your HDD)
61
What is File-Level Encryption
Encryption on files
62
What is Disk-Level Encryption
Encrypts the entire storage device (Protects everything on your computer)
63
What is Data in transit
Data that moves from one point to another (EMAIL)
64
What do SSL (Secure Socket Layer) and TLS (Transport Layer Security) do?
Digital Handshakes agreeing on encryption methods
65
What is a VPN
Creates a secure encrypted connection between your device and a remote server (protected tunnel)
66
What is Business Continuity
Proactive approach to ensure that essential business functions persist during and after any unforeseen event (keep going)
67
What is Fault Tolerance
The ability of a system to continue operating without interruption even when one or more of its components fail
68
What is Redundancy
Duplication of critical components to increase reliability and prevents system failure (back up in case something fails)
69
What us Network Redundancy
Ensures that data still flows even if a part of a system fails (More routers to make sure it has a back up) (Back up route to make sure data still flows)
70
What is Failover
The automatic process where in the event of a failure the system switches to a redundant or standby system (redirect tasks to a redundant server) (when server fails it will switch to a backup server)
71
What is Power Redundancy
Ensures the system is still powered even if the primary power source fails (Emergency power generator, backup power supply)
72
What is a Uninterruptible Power Supply (UPS)
Device that provides immediate and uninterrupted emergency power to connect devices when the main power source is lost (seamless transition)
73
What is a Generator
Device that transforms mechanical energy like gas or diesel or gas into electrical energy (long term solution) (brief delay to turn on)
74
What is Data Replication
When you copy data from one location to another
75
What is Data Redundancy
Making a copy of the original in case something happens to it
76
What is a Redundant Array of Independent Disks (RAID)
Technology uses to combine multiple had drives into a single unit to improve data reliability, performance, or both
77
What does RAID 0 offer
Does not offer redundancy (if one fails the whole system fails) (striping)
78
What does RAID 1 offer
Storage is MIRRORED across two disks (in case one fails it will still function but does not improve performance)
79
What does RAID 5 offer
Its kind of like a balance between raid 0 and raid 1 but it has PARITY (Has redundancy through PARITY) (Has performance and redundancy)
80
What does RAID 10 offer
Merges the mirroring of raid 1 with the striping of raid 0 (Has fast performance and redundancy)
81
What is Disaster Recovery
Resorting IT systems after a disaster (backup or a replicated system) (priorities) (Decide when to give back users access to it)
82
What is Backup Considerations
File Backups Critical Data Database Backups OS Backups
83
Pros and Cons of On-Site
Pro (Faster download and accessibility) Con (Can get lost in fire, stolen, flood)
84
Pros and Cons of Off-Site
Pro (Can access data from anywhere if you have internet, more space) Con ( Need internet, subscription fee, can get stolen by hackers)