Ch 1. Mastering the Basics Flashcards
Presents the basics for understanding security.
Use Case
used to identify and clarify requirements to achieve a goal
Confidentiality
prevent the unauthorized disclosure of data
Encryption
scrambles data to make it unreadable by unauthorized personnel
What are the three elements of Access Controls?
Identification, Authentication, Authorization
Steganography
practice of hiding data within data
What are the three methods of Confidentiality?
Encryption, Access Controls, Steganography
Integrity
provides assurances that data has not changed
Hash
a number created by a executing a hashing algorithm against data
Digital Signature
use certificates and a Public Key Infrastructure to verify integrity and provide authentication and N-R
What are the two methods of Integrity?
Hashing and Digital Signatures
Availability
indicates that data and services are available when needed
Redundancy
adds duplication to critical systems and provides fault tolerance
Patch
code that resolves software bugs
What are the two methods of Availability?
Redundancy and Patching
Risk
the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss
Threat
any circumstance or event that has the potential to compromise confidentiality, integrity, or availability
Vulnerability
a weakness
Security Incident
an adverse event that can negatively affect the confidentiality, integrity, or availability of an org’s IT and data
Risk Mitigation
reducing risk through the implementation of controls, countermeasures, or safeguards
Types of Control Implementation
Technical, Administrative, Physical
Types of Control Goals
Preventative, Detective, Deterrent, Corrective, Compensating
Hypervisor
the software that creates, manages, and runs the VM
NIST
National Institute of Standards and Technology; publishes SPs in the 800 series
Type I Hypervisor
run directly on the system hardware
Type II Hypervisor
runs as software within a host operating system
Application Cell
runs services or applications within isolated application containers
Snapshot
provides with you with a copy of a VM at a moment in time
VM Escape
an attack that allows an attacker to access the host system from within the virtual system
VM Sprawl
occurs when an organization has many VMs that aren’t managed properly
ICMP
Internet Control Message Protocol
NIC
Network Interface Controller
VDI/VDE
Virtual Desktop Infrastructure / Virtual Desktop Environment
TCP
Transmission Control Protocol; allows comps to share resources across a network
UDP
User Datagram Protocol; like TCP, but used for low latency and loss tolerant programs
tracert
command used to trace the path of an IP packet
ARP
Address Resolution Protocol; resolves IP addresses to MAC addresses and stores the results in an ARP cache