Basics Flashcards

1
Q

Confidentiality

A

Information has not been disclosed to unauthorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Information has not been modified or altered without proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Information is able to be stored, accessed, or protected at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AAA of Security

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A
When a person’s identity is established with proof and confirmed by a
system
● Something you know
● Something you are
● Something you have
● Something you do
● Somewhere you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

Occurs when a user is given access to a certain piece of data or certain
areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accounting

A

Tracking of data, computer usage, and network resources
Non-repudiation occurs when you have proof that someone has taken an
action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Threats

A

Malware
Unauthorized Access
System Failure
Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mitigating Threats Approaches

A

Physical Controls
Technical Controls
Administrative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical Controls

A

Alarm systems, locks, surveillance cameras, identification cards, and
security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical Controls

A

Smart cards, encryption, access control lists (ACLs), intrusion detection
systems, and network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Administrative Controls

A

Policies, procedures, security awareness training, contingency planning,
and disaster recovery plans
User training is the most cost-effective security control to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Five Types of Hackers

A
White Hats
Black Hats
Gray Hats
Blue Hats
Elite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

White Hats

A

Non-malicious hackers who attempt to break into a company’s

systems at their request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Black Hats

A

Malicious hackers who break into computer systems and networks without authorization or permission

17
Q

Gray Hats

A

Hackers without any affiliation to a company who attempt to break into a company’s network but risk the law by doing so

18
Q

Blue Hats

A

Hackers who attempt to hack into a network with permission of the company but are not employed by the company

19
Q

Elite

A

Hackers who find and exploit vulnerabilities before anyone else
does
1 in 10,000 are elite

20
Q

Threat Actors

A

Script Kiddies
Hacktivists
Organized Crime
Advanced Persistent Threats

21
Q

Script Kiddies

A

Hackers with little to no skill who only use the tools and exploits written
by others

22
Q

Hacktivists

A

Hackers who are driven by a cause like social change, political agendas, or
terrorism

23
Q

Organized Crime

A

Hackers who are part of a crime group that is well-funded and highly sophisticated

24
Q

Advanced Persistent Threats

A

Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal