Classifying Information Security Flashcards
Ethical Hacking: Understanding Ethical Hacking - Module 2
Fundamentals of Information Security
Confidentiality
Authenticity
Availability
Integrity
Non-repudiation
Authenticity
User goes through a verification process to prove rightful ownership of their account they’re attempting to access.
Integrity
Your data should be safe and unaltered.
Availability
You have the right to access your data whenever you want.
Confidentiality
Guarding against the theft or unauthorized/unintentional access of data.
Non-repudiation
A security concept that prevents users from denying their participation in a transaction or communication.
Classification of Attacks
Close-in attacks
Active attacks
Passive attacks
Insider attacks
Distribution attacks
Passive attacks
Sniffling or eavesdropping attack; listen to traffic and intercept info before it reaches its intended recipient.
eg. eavesdropping, traffic analysis
Active attacks
Involves direct interaction, altering, or disrupting the target’s data
eg. man in the middle, denial of service
Close-in attacks
Attack requiring physical proximity to the target to gain unauthorized access.
eg. shoulder surfing, physical tampering
Insider attacks
Attack carried out by someone with authorized access to the system.
eg. data theft by employee
Distribution attacks
Attack where malicious software or components are inserted into a trusted supply.
eg. tampered software updates, compromised hardware
The Technology Triangle
Usability <-> Functionality <-> Security