Core Security Concepts Flashcards

1
Q

Define: Threat

A

Any potential danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define: Threat agent

A

An entity that may act upon a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define: Vulnerability

A

A weakness or flaw that may provide an opportunity to a threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define: Risk

A

the likelihood of a threat agent exploiting a discovered vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define: Exposure

A

an instance of being compromised by a threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define: Countermeasure

A

An administrative operation, or logical mitigation against potential risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define 3 core security concepts

A
  1. Accounting
  2. Non-repudiation
  3. Privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define: CIA triangle

A

Confidentiality Integrity Availability All wrapped around data and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define: Confidentiality

A

The concept of preventing the disclosure of information to unauthorised parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define 3 confidentiality concepts

A
  1. is about viewing data
  2. assure the secrecy of data
  3. helps maintaining data privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is integrity?

A

The concept of protecting the data from unauthorised alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define 3 integrity concepts

A
  1. It must ensure that the data that is transmitted, processed and stored correctly
  2. Is as accurate as the originator intended
  3. The software performs reliably as it was intended to
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define: Availability

A

The security concept that is related to the access of the software or the data or information it handles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What 2 determines availability ?

A
  1. the criticality of the data or service
  2. its purpose in the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Actions that support availability

A
  1. Loading balancing
  2. replication
  3. redundancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define: Authentication

A

Authentication is the process of determining the identity of a user

17
Q

3 Authentication methods and examples

A
  1. Something you know (password or pin)
  2. Something you have (one time token or phone)
  3. Something you are (fingerprint or biometric)
18
Q

Define: Authorisation

A
  1. Applying access control rules to a user process
  2. Determining whether or not a particular user process can access an object.
19
Q

Define: Requester and requestes resource

A
  1. Requester is referred to as the subject
  2. Requested resource is referred to as the object
20
Q

Authorisation subject can be

and priviledge levels

A
  1. Subject may be human process another object
  2. Can be categorized by privilege level
  • Admin
  • user
  • manager
  • anonymous user
21
Q

Define: Accounting

A
  • Means of measuring activity
  • Also known as auditing
22
Q

Accounting 2 concepts

A
  • Logging crucial elemnts of activity as they occur
  • Audit logs must be balanced as they required resources to create, store and review
23
Q

Define: Non-repudiation

A

The concept of preventing a subject from denying a previous action with an object in a system

24
Q

prevention of repudiation is ensured by:

A

authentication, authorisation and auditing are properly configured

25
Q

privacy 3 concepts

A
  • data anonymisation
  • user consent
  • test data management - prevention of production data leaking into test environments