Chapter 1 Mastering Security Basics Flashcards
Use Case, Access Control, Hashing etc
What is a “Use Case”?
A “Use Case” describes a goal that an organization wants to achieve.
___________prevents the unauthorized disclosure of data.
Confidentiality
_______scrambles data to make it unreadable by unauthorized personnel.
Encryption
What are the key elements of access controls?
Identification, authentication, authorization
Stegnaography is a method of confidentiality.
Stegnaography obscures the data and can be used in a use case to support obfuscation.
What is obfuscation?
to make something unclear of difficult to understand.
Hiding data in plain sight is referred to as
steganography
to provide assurance that data has not changed or been modified or corrupted.
Integrity
How can integrity be enforced with data?
hashing techniques
What are examples of hashing algorithms?
Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Hash-based Message Authentication Code (HMAC).
MAC has three different meanings..
Media access control, Mandatory access control, Message authentication code
What do digital signatures ensure?
authentication, non-repudiation and prevents attackers from impersonating others.
Availability indicates that data and services are available when needed.
Organizations commonly implement redundancy and fault-tolerant methods to ensure availability for key systems.
Why is redundancy important?
it adds duplication to critical systems and provides fault tolerance. continue service with no interruptions.
What does SPOF mean?
Single point of failure