Chapter 1 Flashcards

1
Q

what is CIA?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is Confidentiality

A

prevent unauthorized reading of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is Integrity?

A

detect unauthorized writing of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Availability?

A

data is available in a timely manner when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

when Bob logs into AOB how does AOB know that “Bob” is really Bob? ..Bob’s password is verified..

A

network security issues arise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do we secure network transactions

A

protocols are critically important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does access control include?

A

authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the 4 main concepts?

A

cryptography, protocols, access control and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is Authentication?

A

passwords, biometrics, other methods of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is authorization?

A

access control lists/capabilities

multilevel security, firewalls, intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does protocols include

A

simple authentication protocols and real world security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a simple authentication protocols

A

it focuses on basics of security protocols, lots of applied cryptography in protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a real world security protocols

A

SSH, SSL, IPSec, Kerberos, and in Wireless: WEP and GSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is included in software

A

security critical flaws in software and malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is security critical flaws in software

A

buffer over flow and race conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a malware

A

viruses and worms , prevention and detection