Chapter 1: Mastering Security Basics Flashcards
What are the 3 main components of the “security triad” (CIA)?
Confidentiality, Integrity, Availabillity
What is a “use case”?
A series of steps taken to complete a process by following a specific Place Order (basically a checklist). (This order can follow a Normal Flow where steps are done in a specified order, or Alternate flow where steps are repeated or done in a random manner.)
Eg: In an e-commerce use case, elements might include:
Actor: Lisa is shopping online
Precondition: Lisa needs to select an item to buy before she can place an order
Trigger: Lisa clicks on her shopping cart to begin the purchase process
Postcondition: Lisa’s order enters into the system, she might be billed, the item is shipped
What prevents the unauthorised disclosure of data?
Confidentiality
What method is used to scramble data to make it unreadable by unauthorised personnel?
Encryption
What does PII stand for?
Personally Identifiable Information
What can be used to grant and/or restrict specific users access to specified data?
Access Controls
What are the 3 key elements used as Access Controls?
Identification, Authentication, Authorisation
Eg. Identification = an identity claimed by a user with a unique username
Authentication = a password
Authorisation = use of permissions
What confidentiality method is the practice of hiding data within data?
(Hiding data in plain sight)
Steganography
What confidentiality methods attempt to make something unclear or difficult to understand?
(Security through obscurity)
Obfuscation
What provides assurances that data has not changed/modified/tampered with/corrupted?
Integrity
What do you call a number created by executing a type of algorithm against data, such as a file or a message?
A hash (Hashing)
By comparing hashes created at two different times, you can determine if the original data is still the same. If the hashes are the same, the data is the same. If the hashes are different, the data has changed.
What can verify the integrity of emails and files and also provide authentication and non-repuditation?
(These require certificates.)
Digital signature
What indicates that data and services are available when needed?
Availability
What are some common examples of fault-tolerance?
- Disk redundancies (RAIDs) - Server redundancies (failover clusters) -Load Balancing (multiple servers for single service) -Site redundancies (alternate hot or cold sites in case of natural disasters) -Backups (data can be restored) -Alternate power (UPSs/power generators) -Cooling systems (HVAC)
What is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss?
Risk