2. Understand Security Concepts Flashcards

1
Q

What does CIA mean?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of confidentiality?

A

Confidentiality - “Keeping good data away from bad actors”.

For confidentiality to be maintained in a network, data must be protected at rest, in use and on the wire.

Violations of Confidentiality can come from ANYWHERE, at ANY TIME… bad decisions on the part of users, administrators and customers can all lead to a violation. Also, remember that security policies that are not implemented properly can lead to potential confidentiality violations.

Possible countermeasures include:
- Encryption
- Traffic padding
- Strict access controls/authentication
- Data classificatkon
- Awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Confidentiality countermeasures?

A
  • Encryption
  • Traffic padding
  • Strict access controls/authentication
  • Data classification
  • Awareness training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Integrity mean?

A

Integrity -“ Change control for data - no authorised modification without knowledge and consent of the data owner.”

Three ways in which we can understand Integrity:
1. Preventing unauhorised subjects from making modifications
2. Preventing authorised subjects from making unauthorised modifications
3. Maintaining consistency of objects so that they are true and accurate

Possible countermeasures include:
a. Strict access controls/authentication
b. IDS - Intrusion Detection System
c. Encryption
d. Hashing
e. Interface restrictions / controls
f. Input / function checks (validation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is traffic padding?

A

Traffic padding is a technique used i network security to add extra data to packets in order to make it more difficult for an observer to determine the actua size or timing of the packets being transmitted.
** (extra information) This can help to obscure the true nature of the network and make it harder for attackers to analyse or exploit the network. The purpose of traffic padding is to increase the security & privacy of network communications by making it more challenging for unauthorised parties to intercept, aalie, or manipulate the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TRUE or FALSE: Confidentiality & Interity depend on each other. One is not effective without the other.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 different concepts linked to confidentiality?

A
  1. sensitivity
  2. discretion
  3. criticallity
  4. concealment/ ocultación
  5. isolation/aislamiento
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 different additional concepts linked to Integrity?

A
  1. Accuracy
  2. Authenticity
  3. Validity
  4. Nonrpeudiation - user cannot deny having performed an action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does availability mean?

A

Avalability is the continuous access to objects and data.
**(extra) Authorised subjects can access objects in a timely manner without interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 different countermeasures for availability?

A
  1. Strict access controls / authentication
  2. Continuous montoring
  3. Firewalls & routers to prevent DoS / DoS attacks
  4. Redundant system design
  5. Periodic testing of backup systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The financial services company that Susan works for provides a web portal for its users. When users need to verify their identity, the company uses information from third‐party sources to ask questions based on their past credit reports, such as “Which of the following streets did you live on in 2007?” What process is Susan’s organization using?

A. Identity proofing

B. Password verification

C. Authenticating with Type 2 authentication factor

D. Out‐of‐band identity proofing

A

A. Identity proofing

Explanation

Verifying information that an individual should know about themselves using third‐party factual information (a Type 1 authentication factor) is sometimes known as dynamic knowledge‐based authentication and is a type of identity proofing. Out‐of‐band identity proofing would use another means of contacting the user, such as a text message or phone call, and password verification requires a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What access control scheme labels subjects and objects and allows subjects to access objects when the labels match?

A. DAC

B. MAC

C. Rule‐based access control (RBAC)

D. Role‐based access control (RBAC)

A

B. MAC

Explanation

Mandatory access control (MAC) applies labels to subjects and objects and allows subjects to access objects when their labels match. Discretionary access control (DAC) is controlled by the owner of objects, rule‐based access control applies rules throughout a system, and role‐based access control bases rights on roles, which are often handled as groups of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one of the following activities is an example of an authorization process?

A. User providing a password

B. User passing a facial recognition check

C. System logging user activity

D. System consulting an access control list

A

D. System consulting an access control list

Explanation

Authorization occurs when a system determines whether an authenticated user is permitted to perform an activity, such as by consulting an access control list. Authentication occurs when a user proves his or her identity to a system, such as by providing a password or completing a facial recognition scan. When a system logs user activity, this is an example of accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of token‐based authentication system uses a challenge/response process in which the challenge must be entered on the token?

A. Asynchronous

B. Smart card

C. Synchronous

D. RFID

A

A. Asynchronous

Explanation

Asynchronous tokens use a challenge/response process in which the system sends a challenge and the user responds with a PIN and a calculated response to the challenge. The server performs the same calculations, and if both match, it authenticates the user. Synchronous tokens use a time‐based calculation to generate codes. Smart cards are paired with readers and don’t need to have challenges entered, and RFID devices are not used for challenge/response tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly