Classifying Information Security Flashcards

Ethical Hacking: Understanding Ethical Hacking - Module 2

1
Q

Fundamentals of Information Security

A

Confidentiality
Authenticity
Availability
Integrity
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authenticity

A

User goes through a verification process to prove rightful ownership of their account they’re attempting to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Your data should be safe and unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

You have the right to access your data whenever you want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality

A

Guarding against the theft or unauthorized/unintentional access of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-repudiation

A

A security concept that prevents users from denying their participation in a transaction or communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Classification of Attacks

A

Close-in attacks
Active attacks
Passive attacks
Insider attacks
Distribution attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passive attacks

A

Sniffling or eavesdropping attack; listen to traffic and intercept info before it reaches its intended recipient.

eg. eavesdropping, traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active attacks

A

Involves direct interaction, altering, or disrupting the target’s data

eg. man in the middle, denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Close-in attacks

A

Attack requiring physical proximity to the target to gain unauthorized access.

eg. shoulder surfing, physical tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Insider attacks

A

Attack carried out by someone with authorized access to the system.

eg. data theft by employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Distribution attacks

A

Attack where malicious software or components are inserted into a trusted supply.

eg. tampered software updates, compromised hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Technology Triangle

A

Usability <-> Functionality <-> Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly