2201 Flashcards
Data
The building block of information, usually unorganized and unprocessed
Information
Processed organized data to offer meaning and context
Assets
Resource. this can be hardware or software of people
Security
Protecting assets from attackers, viruses worms natural disasters, power failures or vandalism.
Information System (is)
A system for collecting, processings storing,and distributing information
Information Security (infosec)
Practice of preventing or reducing to Chance of unauthorized access, use, disclosure, disruption, modification or destruction of information and information systems
Security plan
Find a balance between protection usability and cost the cost should not outweigh the value of the assets
CIA triad
Confidentiality integrity and availability
D A D
Disclosure, alteration and denial
Confidentiality
Ability to protect information from those who are not authorized to view it
confidentiality breach
When someone gets access to information that they were not suppose to
Privacy
Data or information is accessible to one authorized source this is different from confidentiality which is accessed by many authorized ppl.
Integrity
Ability to prevent data from being changed in an unauthorized and undesirable manner
Integrity violation
Modification of data in an undesirable manner
Availability
’ When an authorized person can access information when required
Unavailability
Attacking availability may occur when attacker o fails to attack integrity or breach confidentiality
Eg creating too much traffic
How to offer CIA triad
Confidentiality: using encryption l
Integrity: Using encryption and hash
Availability: Using backup & redundancy
Identification
The claim of WHAT someone or some thing is
Identification
Claim of what something or someone is
Authentication
Establishes whether this claim is true(identification)
Identification vs authentication
Identification → public statement of identity
Authentication - private response to challenge
Identification verification
We can verify usingadditional documents (step between identification & authentication)
Five authentication factors
Something You know, have, are, do and somewhere you are
Which 3 things must be balanced in authentication implementation
Protection usability and cost
Mutual authentication
Implemented using a digital certificate can be used in combination with MFA
Password capture attack
Video recordings of entries phishing keylog
Two branches of biometric characteristics
Physiologica &l biological
5 physiological characteristics of biometric identification
’ Fingerprints, iris scan, hand geometry, facial I’d DNA