Basic Security Concepts Flashcards

1
Q

Types of Software

A

System Software: Operating systems
Application Software: Word Processing, Browsers
Utility Software: File Mgmt., Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Application Software?

A

A program designed to perform a specific function foe the user or an application program.
Such as Word Processors, Excel, Database Programs, and Web Browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application Software vs. Operating Systems

A

Application Software: YouTube, Amazon, Twitter, etc

Operating Systems:
Apple iOS, Apple MacOS, Windows, Linux.

Android is powered by Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Architecture - Mainframe?

A

A terminal used for input and output, processing is done by the mainframe.

Mainframe: Other computers are connected to it.

Client-Server Architecture

Client requester- Laptop/Workstation

Server-provider: Email, DNS, File, Application, Printer, Web

Tick or Fat client: Yahoo messenger, Outlook servers

Thin Client: Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Peer-to-Peer (P2P): Ad hoc wireless connection?

A

A computer-to-computer network used for sharing files.

Up to 10 Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Server?

A

Computer program that provides services to other computer programs and their users.

EXPLANATION:
In a restaurant environment a server is like a host that processes information, you put a request in.
The server goes to the chef with the order. The chef is the “database” person who goes into the storage get information and mixes it up. Presents it back to the server. The server brings it back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an ISO role?

A

Day-to-day activities of systems.
Documentation for the system.
Making sure the system is in compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Audit Role?

A

Making sure the systems are in compliance.

Having their documentation in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is (RMF) Risk Management Framework?

A

You can convert the controls from RMF to other frameworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is HITRUST?

A

Health information Trust Alliance.

Each level bills with increasing rigor on the one below.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Web server?

A

A computer program that serves requested HTML pages or files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Web client?

A

The requesting program associated with the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Web browser?

A

In the computer is a client that request HTML files from web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 6 types of Servers?

A

Application Server: design to install operate and host.

Virtual Server: a web server that she has computer resources with other virtual servers.

Mail server a program application responsible for receiving routing and delivering email for remote senders.

Proxy server a system or router that provides a Gateway between uses and Internet.

Blades Ave very thin and small service that fit into “bays” and connect together to perform high-powered computing.

File server a computer responsible for the Central Storage and management of data files for other computers on the same network to access the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Topology do we have in our homes?

A

Star Network Topology. Because everything connected to the modem/router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Information Technology?

A

The study or use of systems especially computers and telecommunications for storing retrieving and sending information

17
Q

What is Information Security?

A

Protects information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.

18
Q

Core Security Principles?

A

CIA:

Confidentiality: Only authorized people have access to information. Need to know basis.

Integrity: Information cannot be modified without detection.

Availability: Information accessible whenever needed.

19
Q

Information Assurance

A

To protect the Confidentiality, Integrity, and Availability of Information and the Information system that host the information.

20
Q

Information System

A

The combination of people, processes, technology, infrastructure and information.

21
Q

AAA Protocols/Framework

A

Identification- Email address, username

Authentication - “Identifies/verifies” determines who the user is.

Authorization - determines what the user can do.

Accounting - determines what the user did.

22
Q

What two forms is Confidentiality is protected?

A
  1. Access Control

2. Encryption

23
Q

What is the method of ensuring Integrity?

A

Hashing

24
Q

SPOF

A

Single Points of Failure

25
Q

What methods are used to increase/maintain availability?

A
Fault tolerance
Virtualization 
HVAC systems
Backups 
Cloud computing 
Generators

Hot & Cold & Warm sites are also used to ensure availability.

26
Q

Confidentiality =
Integrity =
Authentication =

A
Confidentiality = Disclosure 
Integrity = Change 
Authentication = Obliteration