01 Introduction Flashcards

1
Q

Information security

A

Protecting information and information systems.
Defines sets processes and activities performed in order to protect information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hack value

A

Hackers’ evaluation of whether something is worth or interesting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

High hack value examples

A

Accessing peoples credit card information as it can generate money.
Just accessing peoples names just to show a difficult task is doable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

Weakness which can compromise the system and be used for a possible attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploit

A

Breach through vulnerabilities.
Also refers to a software that allows taking advantage of identified vulnerabilities.
E.g. connecting a malicious USB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Payload

A

Part of malware or exploit code
E.g. a keylogger or a RAT (Remote Administration Tool) that a malicious USB installs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zero day attack

A

Exploiting previously unknown vulnerabilities before patch is released.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Daisy chaining

A

An attack in which hackers gain access to one network/device and then using it to access next networks/devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Doxing

A

Finding and publishing someone’s personally identifiable information (PII) for malicious reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bot

A

A software that can be controlled to execute predefined tasks.
Used by hackers to control the infected machines for malicious reasons.
E.g. creating a botnet by infecting more machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA triad

A

known as three principles of information security
Ensures

Confidentiality: so no one can see what’s inside.
Integrity: no one tampers data-in transit
Availability: data is accessible on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality

A

Ensures that information is available only to people who are authorized to access it.
Improper data handling or a hacking attempt leads to confidentiality breaches.

💡 Controls: * encryption * classification * access control * proper disposal (e.g. of DVDs, CDs, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

Ensures the accuracy of the information
Prevents improper and unauthorized changes—the

💡 Controls: * hashing * access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Availability

A

Ensuring resources are available whenever the authorized user needs them

💡 Controls: * redundancy * data back-ups * antivirus * DDoS prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authenticity

A

Ensures the quality of being genuine or uncorrupted, either:

users are actually who they present themselves to be through authentication
or a document or information presented is not corrupted.

Controls: * users (biometrics) * smart cards * data (digital certificates)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Non-repudiation

A

Guarantee that
sender of a message cannot deny having sent the message
recipient cannot deny having received the message

💡 Controls: digital signatures, logging

17
Q

Functionality

A

the features of the system

18
Q

Usability

A

GUI of the system and how user friendly it is.

19
Q

Security

A

How the processes of the system are used and who is using them

20
Q

Interconnected

A

Any change made to one component directly affects decreases the other two.
E.g. if the system security is increased, then the functionality and usability of the system are decreased

21
Q

Data leakage

A

Any sort of unauthorized disclosure of sensitive information from anyone/any system.
Includes emails, malicious links, device theft etc.

22
Q

Data leakage leads to

A

loss of trust e.g. trust to governments decreased during late years
loss of profit e.g. Sony lost profit of their movies after they were leaked before publishing

23
Q

External threats

A

Corporate espionage, phishing, malware
Business partners, consultants when company outsources (Less surveillance than own employees)