Week 9 Flashcards

(22 cards)

1
Q

What is the difference between an entity and an identity?

A

One entity can have multiple identities and vice versa; it’s a many-to-many relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an identity provider (IdP)?

A

A system used to manage identities, including their creation, maintenance, and expiration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define “attribute” in the context of identity management.

A

An attribute is a piece of information about someone or something.

For example, if you’re a student, your name, student ID, and email address are all attributes that describe who you are in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a credential?

A

Something used to support the authentication of entities (e.g., digital certificates, ATM cards).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Federated Identity Management (FIM)?

A

A system allowing a user to access multiple services with one identity using Single Sign-On (SSO).

If you use your university login to access your email, library, and course portal—without logging in separately—that’s FIM in action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the trust model in FIM?

A

The trust model in Federated Identity Management (FIM) works like this:

Users and service providers (SPs) trust the identity provider (IdP) to verify users correctly.
The IdP does the authentication (checks who the user is).
The SP then uses that information to decide what the user can do (authorisation).

It’s like showing your student ID at different buildings on campus. Each building trusts the university (IdP) to have verified you, so they let you in based on your ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Single Sign-On (SSO)?

A

A feature where users log in once and gain access to multiple systems without logging in again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is accountability in ISM?

A

Ensuring actions of an entity can be uniquely traced back to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an audit trail?

A

An audit trail is a record of everything important that happens in a system, like who did what, when, and how.

It’s like a digital receipt or activity log—it tracks actions like logging in, accessing files, changing settings, etc., so you can go back and see what happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is event logging important?

A

Event logging is important because it helps keep track of what happens in a system, which is crucial for:

Security
Accountability
Troubleshooting
Legal and Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a SIEM system?

A

SIEM (Security Information and Event Management) is a tool for collecting and analyzing security data.

It’s like a security control room that watches over all your digital activity logs, looking for threats, problems, or suspicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some types of event logging information?

A

Who, What, When, Where, Why, How, How much, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a SOC (Security Operations Centre)?

A

A centralized team managing and responding to cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a CSIRT?

A

Cyber Security Incident Response Team, often serving sectors or nations beyond one organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an ISAC?

A

Information Sharing and Analysis Centre — facilitates ISM-related information exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the UK Computer Misuse Act 1990 cover?

A

Unauthorized access and actions regarding computer systems.

16
Q

What is the purpose of the UK Investigatory Powers Act 2016?

A

To regulate surveillance and data collection by UK intelligence agencies.

17
Q

What is the UK Online Safety Act 2023?

A

A law aimed at protecting users online, especially children, while balancing free speech.

18
Q

What is the EU eIDAS Regulation about?

A

Electronic identification and trust services across the EU.

19
Q

What is the NIS Directive?

A

EU’s cybersecurity law requiring member states to adopt cybersecurity practices and establish CSIRTs.

20
Q

What is Self-Sovereign Identity (SSI)?

A

A model where individuals control their own digital identities.

21
Q

What are Verifiable Credentials (VCs)?

A

Credentials held by users and verified by third parties, e.g., digital driver’s license.