1. Information Security Flashcards

1
Q

P.I.I.

A

Personal Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Security

A

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Eugene Spafford quote

A

“The only truly secure system is one that is powered off…”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

C.I.A. Triad

A

The Confidentiality, Integrity, and Availability Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Negative of the C.I.A. Triad

A

The D.A.D. Disclosure, Alteration, and Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

C. of the C.I.A. Triad

A

Confidentiality - Ability to protect our data from those who are not authorized to view it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

I. of the C.I.A. Triad

A

Integrity - Ability to prevent people from changing your data in an unauthorized or undesirable manner. You need means to prevent AND reverse unauthorized change. RELIABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A. of the C.I.A. Triad

A

Availability - Ability to access our data when we need it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS Attack

A

Denial of Service Attack. Attacks the A. of the C.I.A. Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Parkerian Hexad

A

C.I.A. Triad + Possession/Control, Authenticity, and Utility (C.I.A.U.P.A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

I. in the Parkerian Hexad

A

Integrity does NOT account for authorized, but incorrect, modification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

P. of the Parkerian Hexad

A

Possession - Physical disposition of the media on which the data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A. of the Parkerian Hexad (Au)

A

Authenticity - Whether you’ve attributed the data in question to the proper owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

U. of the Parkerian Hexad

A

Utility - How useful the data is to you. NOT BINARY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of attacks (4)

A

Interception, Interruption, Modification, and Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does an Interception attack compromise of the C.I.A. Triad?

A

Confidentiality - Unauthorized user access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does an Interruption attack compromise of the C.I.A. Triad?

A

Integrity and Availability - Assets unusable/unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does a modification attack compromise of the C.I.A. Triad?

A

Integrity and Availability - Tampering with assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does a Fabrication attack compromise of the C.I.A. Triad?

A

Integrity and Availability - Generating data, processes, communications, or other similar material with a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk

A

Takes into account the value of the asset to calculate the impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Steps of Risk Management (5)

A

Identify assets > Identify threats > Assess vulnerabilities > Assess risks > Mitigate risks (Repeat as needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Types of controls (3)

A

Physical, Logical, and Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Physical controls

A

Protect the physical environment

24
Q

Logical controls AKA Technical controls

A

Protect the systems, networks, and environments that process, transmit, and store data

25
Q

Administrative controls

A

Based on rules, laws, policies, procedures, guidelines, and other items that are “paper” in nature

26
Q

Incident Response Process (6)

A

Preparation > Detection and Analysis > Containment > Eradication > Recovery > Post Incident Activity

27
Q

I.D.S.

A

Intrusion Detection System

28
Q

A.V.

A

Antivirus

29
Q

S.I.E.M.

A

Security Information and Event Monitoring tool

30
Q

M.S.S.P.

A

Managed Security Service Provider

31
Q

Defense in Depth (Multilayered Defense)

A

External Network (Internal Network (Host (Application (Data) ) ) ) )

32
Q

External Network Defense EXs

A

DMZ, VPN, Logging, Auditing, Penetration Testing, Vulnerability Analysis

33
Q

Network Perimeter Exs

A

Firewalls, Proxy, Logging, Auditing

34
Q

Internal Network Defense Exs

A

IDS, IPS, Logging, Auditing

35
Q

Host Defense Exs

A

Authentications, AV, Firewalls, IDP, IPS, Passwords

36
Q

Application Defense Exs

A

SSO, Content filtering, Data validation, Auditing

37
Q

Data Defense Exs

A

Encryption, Access controls, Backups

38
Q

Authentication (5 types)

A

Act of proving who/what we claim to be - Know (user, pass, pin), Have (Badge, Card, OTP), Are (Fingerprint, Iris, Retina), Do (Handwriting, Typing, Walking), Are (Geolocation)

39
Q

Access Control Types (4)

A

Allowing, Denying, Limiting, Revoking

40
Q

Sandbox (Limiting Control)

A

Set of resources devoted to a program, process, or similar entity, outside of which the entity cannot operate

41
Q

C.S.R.F. (Access Control)

A

Cross-site request forgery - Misuses the authority of the browser on the users computer

42
Q

D.A.C. (Access Control)

A

Discretionary access control

43
Q

M.A.C. (Access Control)

A

Mandatory access control (Principle of least privilege)

44
Q

Ru.B.A.C.

A

Rule-based access control

45
Q

A.B.A.C. (CAPTCHA)

A

Attribute-based access control - Subject vs. Resource

46
Q

Physical Access Controls

A

Controlling movement in/out of buildings

47
Q

Multi-level access control models (3)

A

Bell-La Padula Model, Biba Model, and Brewer and Nash Model

48
Q

Bell-La Padula Model

A

D.A.C. and M.A.C. “No read up. No write down”

49
Q

Biba Model

A

INTEGRITY “No read down. No write up”

50
Q

Brewer and Nash Model

A

Prevent conflicts of interest. Objects, Company Groups, Conflict Cases.

51
Q

Authorization

A

Process of determining exactly what an authenticated party can do

52
Q

A.C.L.s (Access Control Lists)

A

Lists containing info about what kind of access certain parties are allowed to have to a given system

53
Q

File system A.C.L. Examples

A

Read, Write, Execute

54
Q

Network A.C.L.s

A

Filter access based on identifiers like IP (Internet Protocol) Addresses, Media Access Control Addresses, and Ports

55
Q

Ports

A

Numerical designation for one side of a connection between 2 devises. Used to identify the application to which traffic should be routed

56
Q

Media Access Control Addresses

A

Unique identifiers hard-coded into each network interface

57
Q

Confused Deputy Problem

A

When the software with access to a resource (the deputy) has a greater level of permission to access the resource than the user who is controlling the software