Chapters 3 and 4 - Security and Privacy Flashcards

1
Q

What is financial identity theft?

A

Stealing someone’s bank information to apply for a loan and create a financial obligation for you:(

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s medical identity theft?

A

Stealing someone’s personal information to obtain medical care, buy drugs, etc. …. it’s dangerous because your records could include incorrect information that could be dangerous to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is criminal identity theft?

A

Giving another person’s information to police. Bad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fun: What’s a white-hat hacker?

A

Someone hired by a company to break into the organization’s systems to expose vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the CIA triad?

A

Three areas of security that could be endangered by hackers and insider threats.

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication and authorization -
what is it and which part of the CIA triad does it enforce?

A

Two- step process to enforce confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three main factors of authentication?

A

Something-you-know (password), something-you-have (door key), something-you-are (edna mode eye scanner)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is social engineering?

A

A technique to gain access to private accounts by tricking people:(

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

A type of social engineering where someone uses an email to gain private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does encryption protect against?

A

Network sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Private & public keys:
which is used to encrypt data and which is used to decrypt data?

A

Public: encrypt
Private: decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

http VS https

A

http does NOT encrypt your data
https DOES!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the “availability” part of the CIA triad?

A

“ensuring that authorized users can access information and resources when they need to”

ie not TOO secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some threats to availability?

A

Forgetting passcodes, hardware failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does redundancy help protect against hardware failure?

A

Having information in more than one place ensures that hardware failure won’t take your only copy of something important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a disaster recovery plan?

A

Processes, policies, and procedures for the recovery and continuation of an IT system in case of emergency

17
Q

What are the 3 different types of malware?

A
  • viruses
  • worms
  • trojan horses
18
Q

What is a virus?

A

A malicious program that attaches itself to a program or file and spreadas

19
Q

What is a worm?

A

It is similar to a virus, except it can spread from computer to computer by itself

20
Q

What is a Trojan horse?

A

A malicious program desguised as a legitimate one

21
Q

What is a denial-of-service attack?

A

An army of zombie computers all flood one website to crash it

22
Q

How can you defend a denial-of-service attack? Also what is that thing?

A

With a firewall!

A firewall is the bouncer of a website to decide who can come in or not.

23
Q

What does the I in CIA triad stand for? What is it?

A

Integrity

Protecting data from modification or deletion

24
Q

Which element of the CIA triad does “file permissions” help with?

A

Integrity. It specifies what can and cannot be done to a file. (“read only”)

25
Q

What’s version control?

A

An integrity management technique that saves earlier versions so you can restore data if it goes downhill

26
Q

What’s a checksum?

A

Compares hashes to see if the file has been modified (like a label or tag)