Ch. 6 Flashcards

1
Q

What is confidentiality?

A

Restrict access to authorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is integrity?

A

Data has no been altered in an unauthorized manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is availability?

A

Information can be accessed and modified by authorized individuals in an appropriate timeframe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the tools for information security?

A
  • Authentication
  • Access control
  • Encryption
  • Passwords
  • Backup
  • Firewalls
  • Virtual private networks (VPN)
  • Physical security
  • Security policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is authentication?

A

Persons accessing the information is who they say they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is access control?

A

Once it is authenticated, it only provides access to information necessary to perform their job duties to read, modify, add, and/or delete information and is broken up into:

  1. Access control list (ACL)
  2. Role-based access control (RBAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is access control list (ACL)?

A

Created for each resource (information) and is a list of users that can read, write, delete or add information and it is difficult to maintain all the lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is role-based control (RBAC)?

A

Rather than individual lists, users are assigned to roles and these roles define what they can access and simplifies administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is encryption?

A

An algorithm (program) that encodes or scrambles information during transmission or storage. It is decoded/scrambled by only authorized individuals to read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Both the coder and reader agree on the encryption method to use. What two encryption methods are there using keys?

A
  1. Symmetric key

2. Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a symmetric key?

A

Sender and receiver have the key which can be risky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a public key?

A

A public and private key is used where the public key is used to send an encrypted message and a private key that the receiver uses to decode the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are passwords?

A

Single-factor authentication (user ID/password) is the easiest to break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a backup?

A

Important information should be backed up and stored in a separate location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a firewall?

A

Inspects and stops packets of information that don’t apply to strict set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are hardware firewalls connected to?

A

Connected to the network

17
Q

What two kind of firewalls are there?

A

Hardware and software

18
Q

What do software firewalls run on?

A

The operating system and intercepts packets as they arrive to a computer

19
Q

What is intrusion detection systems (IDS)?

A

This watches out for specific types of activities to alert security personnel of potential network attack

20
Q

What are virtual private networks (VPN)?

A

Some systems can be made private using an internal network to limit access to them. Can’t be accessed remotely and are more secure and requires specific connections such as being onsite.

21
Q

What is physical security?

A

Protection of the actual equipment.

22
Q

What are security policies?

A
  • The starting point in developing an overall security plan
  • The formal, brief, and high-level statement issued by senior management.
  • Security policies focus on confidentiality, integrity and availability.
23
Q

What steps should you take as an individual to be more secure yourself?

A
  • Keep your software up to date
  • Install antivirus software
  • Use public networks carefully
  • Backup your data
  • Secure your accounts with two-factor authentication
  • Make your passwords long, unique, and strong
  • Be suspicious of strange links and attachments