CIA Triad/SNORT/Defensive Measures Flashcards
assurance that sensitive information can only be read/interpreted by people/processes that are authorized to
Confidentiality
assurance that authorized users can access/work with information assets, resources when needed with sufficient response and performance.
Availability
assurance that information remains correct and authentic, protected by means of preventing/detecting unauthorized creation, modification and destruction of information.
Integrity
What are some examples of a threat-source?
Natural (Hurricane), human (internal/external).
flaw that can present a security breach
vulnerability
safeguards/countermeasures to reduce risk
management controls
What is the goal of risk management? How can it be accomplished?
to reach zero risk and it can be accomplished by eliminating the threat or the vulnerability.
What are the four approaches when planning additional defensive measures?
Uniform Protection, Protected Enclaves, Information Centric, Vector-Oriented
Information Centric and Vector are typically used when creating new networks. True or False?
False
Uniform Protection and Protected Enclaves are typically used when creating new enterprise networks.
True
defensive approach when all internal hosts receive same level of protection
Uniform Protection
defensive approach when you subdivide the internal network (subdivide and separate networks) so it isn’t one large zone with no internal protections
Protected Enclaves
where the client (supplicant) must pass muster with the networks policy server before getting to the resources on the network
Network Admissions Control
Why do we use firewalls?
to isolate or split up groups and sensitive data from everyone else
In order to travel from one VLAN to another, what do you have to pass through?
Access Control List (ACL)
VPNs can give you two things. What are they?
confidentiality and ability that only hosts that are authorized to connect to other hosts to do so
defensive measure that prioritizes protection of information over systems
Information Centric
The goal of information centric is to protect the information regardless of where the information is. True or False?
True
fast, flexible, open-source Network Intrusion Detection System developed in 1998,
SNORT
Snort is not rule-based. (T or F)
F
Snort looks at all traffic over IP and sniffs both traffic in both directions. (T or F)
T