CS2610 Flashcards

1
Q

What is C in CIA

A

Confidentiality: Keeping information private from unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is I in CIA?

A

Integrity: Keeping information from being altered by accident or by unauthorized editors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is A in CIA?

A

Availability: Making sure that info can be used when/where it is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Assets, Threats, Safeguards, Vulnerabilities, and Exploits?

A

Assets are things you want to protect like info, software, hardware, bandwidth, etc. Threats are the potential for an undesirable event to befall an asset. Safeguards are controls implemented to reduce the risk of threats. Vulnerabilities are the absence or weakness of safeguards. And exploits are techniques that take advantage of vulnerabilities to attack assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the rules/guidelines of security?

A

The cost of providing safeguards must remain less than the cost of failing to maintain CIA. More confidentiality = less availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why are our systems and networks attacked?

A

Stealing or gathering information, stealing money, using assets, destroy/deny assets, corrupt info, harm reputation, prepare for future action, testing of vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four elements/factors of defensibility?

A

Controlled: authentication, password security, access controls, and physical security
Minimized: unnecessary assets and access privileges.
Monitored: logs, audits, antivirus, intrusion detection, and file integrity.
Current: patches, updates, version checks, and backup plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the phases of an attack:

A

Five P’s: Probe the system, penetrate the security faults, persist and maintain access, propagate through the system and to other networks, and profit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Cyberspace?

A

The environment in which communication/exchange of information and data over computer networks occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Cybersecurity?

A

The protection of computer systems from theft or damage to their assets, or disruption of their services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List vs stack

A

Spatial order vs reverse chronological order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly