Basic Security Concepts Flashcards
Types of Software
System Software: Operating systems
Application Software: Word Processing, Browsers
Utility Software: File Mgmt., Antivirus
What is an Application Software?
A program designed to perform a specific function foe the user or an application program.
Such as Word Processors, Excel, Database Programs, and Web Browsers
Application Software vs. Operating Systems
Application Software: YouTube, Amazon, Twitter, etc
Operating Systems:
Apple iOS, Apple MacOS, Windows, Linux.
Android is powered by Linux
What is Architecture - Mainframe?
A terminal used for input and output, processing is done by the mainframe.
Mainframe: Other computers are connected to it.
Client-Server Architecture
Client requester- Laptop/Workstation
Server-provider: Email, DNS, File, Application, Printer, Web
Tick or Fat client: Yahoo messenger, Outlook servers
Thin Client: Modem
What is Peer-to-Peer (P2P): Ad hoc wireless connection?
A computer-to-computer network used for sharing files.
Up to 10 Computers
What is a Server?
Computer program that provides services to other computer programs and their users.
EXPLANATION:
In a restaurant environment a server is like a host that processes information, you put a request in.
The server goes to the chef with the order. The chef is the “database” person who goes into the storage get information and mixes it up. Presents it back to the server. The server brings it back.
What is an ISO role?
Day-to-day activities of systems.
Documentation for the system.
Making sure the system is in compliance.
What is an Audit Role?
Making sure the systems are in compliance.
Having their documentation in place.
What is (RMF) Risk Management Framework?
You can convert the controls from RMF to other frameworks.
What is HITRUST?
Health information Trust Alliance.
Each level bills with increasing rigor on the one below.
What is a Web server?
A computer program that serves requested HTML pages or files.
What is a Web client?
The requesting program associated with the user.
What is a Web browser?
In the computer is a client that request HTML files from web servers.
What are the 6 types of Servers?
Application Server: design to install operate and host.
Virtual Server: a web server that she has computer resources with other virtual servers.
Mail server a program application responsible for receiving routing and delivering email for remote senders.
Proxy server a system or router that provides a Gateway between uses and Internet.
Blades Ave very thin and small service that fit into “bays” and connect together to perform high-powered computing.
File server a computer responsible for the Central Storage and management of data files for other computers on the same network to access the files.
What Topology do we have in our homes?
Star Network Topology. Because everything connected to the modem/router.
What is Information Technology?
The study or use of systems especially computers and telecommunications for storing retrieving and sending information
What is Information Security?
Protects information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.
Core Security Principles?
CIA:
Confidentiality: Only authorized people have access to information. Need to know basis.
Integrity: Information cannot be modified without detection.
Availability: Information accessible whenever needed.
Information Assurance
To protect the Confidentiality, Integrity, and Availability of Information and the Information system that host the information.
Information System
The combination of people, processes, technology, infrastructure and information.
AAA Protocols/Framework
Identification- Email address, username
Authentication - “Identifies/verifies” determines who the user is.
Authorization - determines what the user can do.
Accounting - determines what the user did.
What two forms is Confidentiality is protected?
- Access Control
2. Encryption
What is the method of ensuring Integrity?
Hashing
SPOF
Single Points of Failure
What methods are used to increase/maintain availability?
Fault tolerance Virtualization HVAC systems Backups Cloud computing Generators
Hot & Cold & Warm sites are also used to ensure availability.
Confidentiality =
Integrity =
Authentication =
Confidentiality = Disclosure Integrity = Change Authentication = Obliteration