Chapter 1 Flashcards
Confidentiality
Prevents the unauthorized disclosure of data.
Encryption
Scrambles data to make it unreadable by unauthorized personnel.
PII
Personally identifiable information
Access controls
Identification, authentication, and authorization combined provide access controls and ensure only authorized personnel can access data.
Identification
User claims and identity with a unique username.
Authentication
Users prove their identity with authentication such as with a password.
Authorization
Access to a resource is granted or restricted by using an authorization methods such as permissions
Steganography
Hiding data within data.
Integrity
Provides assurances that the data has not been modified tampered with or corrupted. Hashing verifies integrity.
Digital signatures
Can verify the integrity of emails and files. Did you know signatures require certificates and also provide after authentication and non-repudiation.
Availability
Ensuring that data and services are available when needed.
Redundancy
Provides duplication have critical systems or data.
Fault tolerance
A system contains redundant components and can continue operating after experiencing a fault.
Patching
The process of applying software updates to applications to ensure availability and security.
Safety
Safety is a common goal of security. Examples include fencing, lighting, stronger locks, door access systems. Door locks typically fail open.
Layered security
Combines multiple layers of security such as firewall intrusion detection systems content filtering and antivirus software.
Risk
The likelihood that a threat will exploit of vulnerability.
Identification
Occurs when a user claims and identity such as with a username or email address.
Identity proofing
The process of verifying an individual is who he says he is prior to issuing him credentials.
Factors of authentication
Something you know. Something you have. Something you are. Some where you are. Something you do. Gesture.
Complex passwords
Use a mix of character types have a minimum password length of eight characters
Before resetting passwords
Verify the users identity.
Password history
Remembers the last few passwords have a user and prevents reuse.
Minimum Password age
Prevents a user from changing your password for set time. Typically one day.
Something you know
Typically a password or pin and the weakest form of authentication.
Something you have
An item you can physically hold such a smart cards key fobs.
Smart card
A credit card size card with the name bed is microchip and a certificate.
CAC
Common access card. Smart card used by department of defense that has a picture of its user.
PIV
Smart card used by federal agencies include photo identification and provides smartcard features.