CIA, non-repudiation, authentication. Flashcards

1
Q

What does confidentiality ensure? Examples?

A

It ensures that unauthorized individuals are NOT able to gain access to sensitive information.
Ex: Firewalls, access control lists, encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does integrity ensure? Examples?

A

It ensures that there are no unauthorized modifications to info or info systems.
Ex: Hashing (used for authentication) , Integrity monitoring solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does availability ensure? Examples?

A

It ensures that info and systems are ready to meet the needs of legitimate users.
Ex: Fault tolerance (ability for system to continue to operate), clustering, backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is nonrepudiation? Examples?

A

We have proof of integrity and can confirm that info receive is from original party.
Ex: Your signature, you really did sign the contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is proof integrity? How’s it accomplish?

A

Any data that’s received we can verify it is the same data that was originally sent. Using a hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is proof of origin? How can it be accomplish?

A

Verify the person that sent the data to us By using digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proves the message was not changed?
Proves the source of the message?
Makes sure the signature isn’t fake?

A
  1. Integrity
  2. Authentication
  3. Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What key is used to encrypt a hash?

A

Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What key is used to decrypt a digital signature?

A

Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the AAA framework?

A
  1. Authentication
  2. Authorization
  3. Accounting, refers to login time, data sent and received, logout time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you truly authenticate a device?

A

Put a digitally signed certificate on a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Device or software that’s responsible for managing all certificates in our environment is known as-

A

CA (Certificate of Authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an authorization model?

A

function of specifying rights/privileges for accessing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is gap analysis? And what are the steps?

A

Study of where we are versus where we would like to be.
1. Create a baseline, end goal?
2. get a baseline of employees
3. Evaluate current IT systems/policies
4. Compare, find out weaknesses, how to compensate
5. Create final document, what’s discovered, pathway to move forward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly