Chapter 1 Mastering Security Basics Flashcards
Use Case, Access Control, Hashing etc
What is a “Use Case”?
A “Use Case” describes a goal that an organization wants to achieve.
___________prevents the unauthorized disclosure of data.
Confidentiality
_______scrambles data to make it unreadable by unauthorized personnel.
Encryption
What are the key elements of access controls?
Identification, authentication, authorization
Stegnaography is a method of confidentiality.
Stegnaography obscures the data and can be used in a use case to support obfuscation.
What is obfuscation?
to make something unclear of difficult to understand.
Hiding data in plain sight is referred to as
steganography
to provide assurance that data has not changed or been modified or corrupted.
Integrity
How can integrity be enforced with data?
hashing techniques
What are examples of hashing algorithms?
Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Hash-based Message Authentication Code (HMAC).
MAC has three different meanings..
Media access control, Mandatory access control, Message authentication code
What do digital signatures ensure?
authentication, non-repudiation and prevents attackers from impersonating others.
Availability indicates that data and services are available when needed.
Organizations commonly implement redundancy and fault-tolerant methods to ensure availability for key systems.
Why is redundancy important?
it adds duplication to critical systems and provides fault tolerance. continue service with no interruptions.
What does SPOF mean?
Single point of failure
What is the common goal of fault tolerance and redundancy?
to remove single point of failure (SPOF)
______the possibility of a threat exploiting a vulnerability and resulting in a loss
Risk
_______can occur if personnel in a organization don’t manage the VMs correctly.
VM sprawl
Louie hid several plaintext documents within an image file. He then sent the image file to Tony. Which of the following best describe the purpose of his actions?
support obfuscation
_______allow an attacker to access the host system from the VM.
VM escape attacks
_________the state of a VM at a moment in time.
Snapshot
_________ a specialized version of a Type II hypervisor that has use the kernal of the host.
Container virtualization
__________ runs as a software within a host operating system
Type II Hypervisor
_______run directly on the system hardware.
Type I Hypervisor