Chapters 3 and 4 - Security and Privacy Flashcards
What is financial identity theft?
Stealing someone’s bank information to apply for a loan and create a financial obligation for you:(
What’s medical identity theft?
Stealing someone’s personal information to obtain medical care, buy drugs, etc. …. it’s dangerous because your records could include incorrect information that could be dangerous to you
What is criminal identity theft?
Giving another person’s information to police. Bad.
Fun: What’s a white-hat hacker?
Someone hired by a company to break into the organization’s systems to expose vulnerabilities
What is the CIA triad?
Three areas of security that could be endangered by hackers and insider threats.
Confidentiality, Integrity, Availability
Authentication and authorization -
what is it and which part of the CIA triad does it enforce?
Two- step process to enforce confidentiality
What are the three main factors of authentication?
Something-you-know (password), something-you-have (door key), something-you-are (edna mode eye scanner)
What is social engineering?
A technique to gain access to private accounts by tricking people:(
What is phishing?
A type of social engineering where someone uses an email to gain private information.
What does encryption protect against?
Network sniffing
Private & public keys:
which is used to encrypt data and which is used to decrypt data?
Public: encrypt
Private: decrypt
http VS https
http does NOT encrypt your data
https DOES!
What is the “availability” part of the CIA triad?
“ensuring that authorized users can access information and resources when they need to”
ie not TOO secure
What are some threats to availability?
Forgetting passcodes, hardware failure
How does redundancy help protect against hardware failure?
Having information in more than one place ensures that hardware failure won’t take your only copy of something important
What is a disaster recovery plan?
Processes, policies, and procedures for the recovery and continuation of an IT system in case of emergency
What are the 3 different types of malware?
- viruses
- worms
- trojan horses
What is a virus?
A malicious program that attaches itself to a program or file and spreadas
What is a worm?
It is similar to a virus, except it can spread from computer to computer by itself
What is a Trojan horse?
A malicious program desguised as a legitimate one
What is a denial-of-service attack?
An army of zombie computers all flood one website to crash it
How can you defend a denial-of-service attack? Also what is that thing?
With a firewall!
A firewall is the bouncer of a website to decide who can come in or not.
What does the I in CIA triad stand for? What is it?
Integrity
Protecting data from modification or deletion
Which element of the CIA triad does “file permissions” help with?
Integrity. It specifies what can and cannot be done to a file. (“read only”)
What’s version control?
An integrity management technique that saves earlier versions so you can restore data if it goes downhill
What’s a checksum?
Compares hashes to see if the file has been modified (like a label or tag)