Cit Flashcards

1
Q

What is Information Security?

A

It is the protecting of information and information systems from unauthorized access, use etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is information assets?

A

Data that one deems valuable.
It can be either physical or digital.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of information assets.

A

Paper documents
Digital documents
Password
Software
Source
Etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is our most important assets?

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should we consider when securing an asset?

A

We must consider how the level of security relates to the value of the asset.
Example
If it is very valuable it should have high security.
Vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 types of security controls?

A

Prevention
Detection
Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is prevention in security controls?

A

They try to prevent an incident from happening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is detection in security controls?

A

They try to detect incidents after they have happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is recovery in security controls?

A

They try to reverse the impact of an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the CIA Triad?

A

Confidentiality
Availability
Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is confidentiality in the CIA?

A

This means information should only be accessible to those who are authorized to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Integrity in the CIA Triad?

A

It means information should not be tampered with by unauthorized people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Availability in the CIA Triad?

A

It is ensuring that data is accessible and usable when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Parkerian hexad?

A

It is an extension of the CIA Triad
It adds 3 more to the CIA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is possession in the Parkerian hexad?

A

It refers to the physical arrangement of media which the data is stored on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is authenticity in the Parkerian hexad?

A

It is about verifying the origin and legitimacy of the data.
It ensures that the data comes from a reliable source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is utility in the Parkerian hexad?

A

It is how useful and relevant the data is.
It should server its purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an attack?

A

An attack is a security threat that involves an attempt to obtain, change, destroy, implant or reveal info with out permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 4 types of attacks?

A

Interception
Interruption
Modification
Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is interception?

A

It allow unauthorized users to access data and applications.
Attack against confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some examples of interception attacks?

A

Eavesdropping
Wiretapping
Key logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is interruption?

A

It is when a network service (data) is made unavailable.
Attacks against Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some examples of interruption?

A

Ransomware
DDos/overloading
Cutting a communication line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is modification?

A

It is an attack against the integrity of the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the 3 types of modification?

A

Change: change existing information.
Insertion: Adding information that was not originally there.
Deletion:
Removal of existing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are some examples of modification?

A

Data tampering
Changing the contents of a message.
Altering programs actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is fabrication?

A

It is the creation of fake data, identifies, information with the intent to gain unauthorized access.
Attack on integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is spoofing?

A

Fake email trying to pretend it is real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is an information security threat?

A

Any thing that can harm the CIA of business’s information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the 3 types of information security threats.

A

Abusers and Misusers
Accidental occurrences
Natural Physical Forces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is abusers and misusers

A

It occurs when users inappropriately use their privalages whether intentional or not.

32
Q

What is accidental occurrences.

A

It occurs when an employee’s actions lead to damages to the company’s data and system.

33
Q

What is natural physical forces?

A

They are non human threats.
Examples: Floods, earthquakes etc

34
Q

What is defense in depth?

A

It is a multilayered defense system.

35
Q

What are the type of controls?

A

Physical
Administrative
Technical

36
Q

What is physical controls?

A

Stuff like fences, gates, locks cameras, guards, ac

37
Q

What is administrative controls?

A

Based on rules, policies, tos etc.

38
Q

What are technical controls?

A

Passwords, encryption, firewalls, etc

39
Q

What is identification?

A

It is a claim of who you are.

40
Q

What is identity verification?

A

Examples showing ID card, drivers license

41
Q

What is authentication?

A

It is a set of methods used to establish a claim of identity to be true.

42
Q

What are the types of authentication factors.

A

Something you know
Something you are
Something you have
Something you do
Where you are located

43
Q

Examples of something you know

A

Passwords
PINs

44
Q

Examples of something you are

A

Biometrics
Fingerprints
Iris

45
Q

Examples of something have

A

Cards
Phones
Keys

46
Q

Examples of something do

A

Handwriting
How you walk
How you talk

47
Q

What is Where you are located

A

It depends on where the person is physically present.

48
Q

What is multifactor authentication

A

It uses one or more something you etc.

49
Q

What is mutual authentication

A

It is when both parties authenticate each other.
It is mostly implemented through digit certificates.

50
Q

What is manual synchronization of passwords?

A

Using the same password everywhere

51
Q

What is enrollment

A

Recording biometrics

52
Q

What is a hardware token?

A

Example credit cards
Works like google authenticator but usb.

53
Q

What is authorization?

A

It is what the user is allowed to access or do.

54
Q

What is principle of least privilege

A

Only the bare minimum of access should be allowed.

55
Q

What are the types of access controls

A

Allowing access
Denying access
Limiting access
Revoking access

56
Q

What is Access control lists

A

It’s a lists of rules that determine who is allowed or denied access to a computer system, network etc.

57
Q

What are the 2 identifiers

A

Internet protocol addresses
Media access control addresses

58
Q

What is accountability

A

It provides us with means to trace activities back to their source.

59
Q

What is nonrepudiation

A

It’s a situation where evidence exists to prevent a person from denying that they made a statement or taken an action.

60
Q

What is deterrence

A

Deters against misbehavior and misuse.

61
Q

What is auditing

A

It is the reviewing and examining of records, systems etc

62
Q

What is logging?

A

It gives us a history of the activities that has happened.

63
Q

What is monitoring?

A

It is the watching of specific items of collected data.

64
Q

What are vulnerabilities assessment

A

They involve using scanning tools to locate vulnerabilities in the system.

65
Q

What is cryptography

A

It is the science of keeping information secure.

66
Q

What is a cryptosystem

A

It’s a structure consisting of algorithms that turn plaintext to ciphertext.

67
Q

What are the components of a cryptosystem

A

Plaintext
Ciphertext
Encryption algorithm
Decryption algorithm
Encryption key
Decryption key

68
Q

What is plain text

A

It is the data that needs to be protected.

69
Q

What is encryption algorithm

A

It is a process that produces a cipher text for plain text and an encryption key.

70
Q

What is ciphertext

A

It is the scrambled version of the plaintext.

71
Q

What is the decryption algorithm

A

The reverse of the encryption one

72
Q

What is an encryption key

A

It is inputted in the encryption algorithm along with the plaintext to compute the cipher text.

73
Q

What is a decryption key

A

It is inputted in the decryption algorithm along with the cipher text to compute the plaintext

74
Q

What are the 2 types of cryptosystems

A

Symmetric key encryption
Asymmetric key encryption

75
Q

What is the symmetric key encryption

A

Uses a single key for both encryption and decryption

76
Q

What is asymmetric key encryption

A

Uses a public key and private key

77
Q

What are hashes used for?

A

To discover if the original contents of a message has been changed