401/501 Study Guide Flashcards
What Port is DNS?
53
CIA Triad
C - Confidentiality
I - Integrity
A - Availability
**These three are EQUALLY as important
When information remains true to the creators intent
Integrity
What are some common network applications that use UDP?
- Domain Name System (DNS)
- Streaming media…like IPTV
- Voice over IP (VoIP)
- Trivial File Transfer Protocol (TFTP)
- Many online games
Information conforms to reality
Authenticity
According to 1000 Foot View, what are the core principles of IA?
Confidentiality, Availability, Authenticity, Authorized Use, Privacy, Non-Repudiation, Utilization, Possession, Integrity
When information is fit for a purpose and in a usable state
Utilization
Only authorized personnel may access cost incurring services
Ex.) toll-fraud prevention
Authorized Use
What are the Five DIACAP Activities?
- Initiate & Plan IA C&A
- Implement & Validate assigned IA Controls
- Make Certification Determination & Accreditation Decision
- Maintain Authorization to Operate & Conduct Reviews
- Decommission
When only authorized personnel may disclose or observe information
Confidentiality
When the originator of message or transaction may not later deny action
Non-Repudiation
What does DIACAP stand for?
Department of Defense Information Assurance Certification Accreditation Processes
What Port is HTTP?
80
What layer of the OSI Model Diagram provides end-to-end data transmission integrity?
Transport
Who invented the one-time password?
Gilbert Vernam
Called it the “Vernam Cipher”
1917
*a simpler message-based connectionless protocol
Communication is achieved by transmitting information in one direction from source to destination without verifying the readiness or state of the receiver
- connectionless protocols do not set up a dedicated end-to-end connection
User Datagram Protocol (UDP)
What layer of the OSI Model Diagram establishes, maintains and manages sessions?
For example~ the synchronization of data flow
Session
What is Port 110?
POP3
What does OSI stand for?
Open Systems Interconnection
What are the 7 levels of the OSI Model Diagram?
7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical
What layer of the OSI Model Diagram provides data representation between systems?
Presentation
What layer of the OSI Model Diagram provides transfer of information units to the other end of the physical link?
Data Link
What Port is HTTPS?
443
An attack in which the attacker sends a large number of connection or information requests to overwhelm and cripple a target
Denial-of-Service (DoS) attack
What Port is LDAP?
389
The process of using social skills to convince people to reveal access credentials or other valuable information to the attacker
Social engineering
When information is ready for use within stated operational parameters
Availability
The industry standard for computer security since the development of the mainframe.
Known as the Holy Trinity of IA
~based on 3 characteristics that describe the utility of information.
C.I.A. Triad
Based on confidentiality, integrity, and availability
A self-replicating computer program that uses a network to send copies of itself to other nodes, and it may do so without any user intervention. It does not need to attach itself to an existing program
Worm
What hackers do – The Five Phases of Hacking
Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining Access Phase 5 - Covering Tracks
Methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits
Biometrics
Software designed to infiltrate a computer without the owner’s informed consent
Malware
-short for malicious software
An attack in which a coordinated stream of connection requests is launched against a target from many locations at the same time
ie. Black Friday, Cyber Monday, Super Bowl Sunday
Distributed Denial-of-Service (DDoS) attack
A bit pattern that defines which portion of the 32 bits represents a subnet address
Subnet Mask
What Port is FTP?
20, 21
This can provide a two-factor authentication method because the user may have to enter a PIN. This means the user must provide something she knows and something she has
Smart card
What is Port 143?
IMAP4