Chapter 6 - CS3 - Info System Security Flashcards
Briefly define each of the three members of the information security triad.
- Confidentiality - only authorized users can access
- Integrity - information can be trusted, unaltered
- Availability - authorized users can access & modify info in an appropriate timeframe
What does the term authentication mean?
The process of ensuring that a person is who they claim to be
What is role-based access control? What is an access control list?
RBAC = assigning roles w/ preset permissions to users ACL = assigning permissions to users
What is pretexting?
Pretexting occurs when an attacker calls a helpdesk or security administrator and pretends to be a particular authorized user having trouble logging in. Then, by providing some personal information about the authorized user, the attacker convinces the security person to reset the password and tell him what it is.
What is a firewall?
Hardware or software (or both) that filters packets as they enter based on set of rules; protects network’s resources from intrusion
What is multi-factor authentication?
Using more than one method of authentication - something you know, something you have, & something you are
What are biometrics?
Using physical characteristics (eye-scan, fingerprint) to authenticate
What is the purpose of encryption? What are the two types of keys?
To keep transmitted data secret so that only those with a key can read it
Symmetric key - both parties share key, both can encode & decode
Public key - one party has public key (to encrypt); you need private key to decrypt
Cyber-extortionist
Person who demands payment in order to prevent or stop attacks on an organization’s network, website or computer systems
Script kiddies (skiddie)
An unskilled individual who uses scripts or programs developed by others to attack computer systems and networks
Malware
Malicious software
Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
Computer virus
Program that attaches itself to a file, reproduces & spreads to other files
Key characteristic: will “lurk” for days or months quietly replicating itself
Worm
Sub-class of virus Can spread w/o human help
Trojan horse
NOT a virus, DO NOT replicate themselves
Destructive program, looks like genuine application
Botnet
Group of compromised computers connected to a network