Chapter 11 - OSI Flashcards
What are three common methods to attack people ?
Social Engineering attacks, Social Network attacks an password attacks
What are two components of reduction analysis
- Reducing the number of attacks we have to consider
- Reducing a threat posed by attackers
What are the three Categories of controls?
Administrative, Technical an Physical
What are the 2 types of intellectual property
Industrial and copy right
Define CIA
Confidentiality Integrity and Availability
Define Confidentiality
Provides a high level of assurance that information is kept form unauthorised parties
Sensitivity
Measure of Harm or Damage if Information was to be disclosed
What are the Goals of Security
Confidentiality, Integrity an Availbility
When is confidentiality achieved
When we have a High level of assurance that the information is kept from Un authorised parties
How can Confidentiality be circumvented ?
Social engineering attacks such as
- Shoulder surfing ,
- Brute Force Password attacks
- Decrypting Packets
Confidentiality is enforced by
- Encrypting data
- Classifying and restricting data
Encryption at rest, encryption in Transit and access Controls are Examples of which CIA objective
Confidentiality
Other important Confidentiality Concepts are :
- Sensitivity
- Discression
- Criticatlity
- Conealment
- Secrecy
- Privacy
- Seclussion
- Issolation
Measure of harm or damage if the information was t be disclosed
Sensitivity
shown by person choosing to control disclosure of information to limit damage
Disclosure