CH 1 Mastering the basics of Security Flashcards

1
Q

___, ___, and ___ together form the security triad.

A

Confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ helps prevent the unauthorized disclosure of data. It uses multiple methods, such as authentication combined with access controls, and cryptography.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ provides confidentiality by encrypting data. Many different encryption algorithms are available to provide confidentiality.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Many elements of security help to enforce confidentiality beyond encryption. These include elements such as ____, ____, ____, and ____ that combine to ensure only authorized personnel can access the data.

A

authentication
access control methods
physical security
permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ ensures that data is only viewable by authorized users. If there is a risk of sensitive data falling into the wrong hands, it should be encrypted to make it unreadable. Any data should be protected with access controls to enforce ____.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ provides assurances that data has not been modified, tampered with, or corrupted. Ideally, only authorized users modify data.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a____ is simply a number created by executing a hashing algorithm against
data such as a file or message.

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ provides assurances that data has not modified, tampered with, or corrupted.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____verifies integrity.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___is used to verify that data has not been modified, and loss of ____ can occur through
unauthorized or unintended changes. Hashing algorithms such as MD5, HMAC, or SHA1 can calculate hashes to
verify integrity.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A___ is simply a number created by applying the algorithm to a file or message at different
times. The ___ are compared to each other to verify that integrity has been maintained.

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ indicates that data and services are ____ when needed. For some companies, this simply means that the data and services must be ____ between 8 a.m. and 5 p.m., Monday through Friday. For other companies, this means they must be ____ twenty-four hours a day, seven days a week, 365 days a year.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Availability):
Fault-tolerant disks such as RAID-1 (mirroring) and RAID-5 (striping with parity) allow a system to
continue to operate even if a disk fails.

A

Disk redundancies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Availability):
Failover clusters can be implemented that will allow a service to continue to be provided even
if a server fails. In a failover cluster, the service switches from the failed server in a cluster to an operational server in the same cluster. Virtualization (covered in chapter 5) can also increase availability of servers by reducing unplanned downtime.

A

Server redundancies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Availability):
If a site can no longer function due to a disaster, such as a fire, flood, hurricane, or earthquake,
the site can move functionality to an alternate site. The alternate site can be a hot site (ready and available 24/7), a cold site (a location where equipment, data, and personnel can be moved to when needed), or a warm site (somewhere in the middle of a hot site and cold site).

A

Site redundancies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Availability):
If important data is backed up, it can be restored when it is lost. Data can be lost due to corruption,
deletion, application errors, human error, and even hungry gremlins that can randomly eat your data. If data backups do not exist, then when it is lost, it will be lost forever.

A

Backups.

17
Q

(Availability):
Uninterruptible power supplies (UPSs) and power generators can provide power to key systems
even if commercial power fails.

A

Alternate power.

18
Q

(Availability):
Heating, ventilation, and air-conditioning (HVAC) systems improve the availability of systems by
reducing outages from overheating.

A

Cooling systems.

19
Q

____ ensures that systems are up and operational when needed and often addresses single points of
failure. You can increase availability by adding fault tolerance and redundancies such as RAID, clustering, backups, and generators. HVAC systems also increase availability.

A

Availability

20
Q

___ is used to prevent entities from denying they took an action. Digitally signed e-mail prevents
individuals from later denying they sent it. An audit log provides ____ since audit log entries include who took an action in addition to what the action was, where the action took place, and when it occurred.

A

Non-repudiation