Chapter 1 Flashcards

1
Q

Confidentiality

A

Prevents the unauthorized disclosure of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Scrambles data to make it unreadable by unauthorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PII

A

Personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access controls

A

Identification, authentication, and authorization combined provide access controls and ensure only authorized personnel can access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identification

A

User claims and identity with a unique username.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

Users prove their identity with authentication such as with a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

Access to a resource is granted or restricted by using an authorization methods such as permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steganography

A

Hiding data within data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A

Provides assurances that the data has not been modified tampered with or corrupted. Hashing verifies integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital signatures

A

Can verify the integrity of emails and files. Did you know signatures require certificates and also provide after authentication and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Availability

A

Ensuring that data and services are available when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Redundancy

A

Provides duplication have critical systems or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fault tolerance

A

A system contains redundant components and can continue operating after experiencing a fault.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Patching

A

The process of applying software updates to applications to ensure availability and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Safety

A

Safety is a common goal of security. Examples include fencing, lighting, stronger locks, door access systems. Door locks typically fail open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layered security

A

Combines multiple layers of security such as firewall intrusion detection systems content filtering and antivirus software.

17
Q

Risk

A

The likelihood that a threat will exploit of vulnerability.

18
Q

Identification

A

Occurs when a user claims and identity such as with a username or email address.

19
Q

Identity proofing

A

The process of verifying an individual is who he says he is prior to issuing him credentials.

20
Q

Factors of authentication

A
Something you know.
Something you have.
Something you are.
Some where you are.
Something you do. Gesture.
21
Q

Complex passwords

A

Use a mix of character types have a minimum password length of eight characters

22
Q

Before resetting passwords

A

Verify the users identity.

23
Q

Password history

A

Remembers the last few passwords have a user and prevents reuse.

24
Q

Minimum Password age

A

Prevents a user from changing your password for set time. Typically one day.

25
Q

Something you know

A

Typically a password or pin and the weakest form of authentication.

26
Q

Something you have

A

An item you can physically hold such a smart cards key fobs.

27
Q

Smart card

A

A credit card size card with the name bed is microchip and a certificate.

28
Q

CAC

A

Common access card. Smart card used by department of defense that has a picture of its user.

29
Q

PIV

A

Smart card used by federal agencies include photo identification and provides smartcard features.