Cyber terminology Flashcards
a group of computers that is networked together and used by hackers to steal information
Botnet
Definition of cyber security
the technologies and procedures intended to safeguard computers, networks and data from unlawful access.
Principal of protecting sensitive information against access and disclosure to unauthorised entities, either intentionally or unintentionally.
Confidentiality
Principle of protecting information against improper modification. It is the accuracy, consistency, and trustworthiness of data during its entire life cycle. Related to the originality of the data.
Integrity
Assurance that the systems responsible for delivering, storing, and processing information are accessible when needed, by those who need them.
Availability
Which CIA triad was breached when they stole bank data and customers personal identification in the US target case?
Confidentiality
The mechanism of verifying the identity of a user to prevent unauthorised access
Authentication
The services which determine which r4esouces are accessed, when and by who
Authorisation
Keeping track of what users do, including what they access, the amount of time they access resources and any changes made
Accounting
Identification
determines the true identity of a user in relation to the authentication, authorisation and accounting system
Non-repudiation
protects against denial by one of the parties in a communication
Peers if they implement the same protocol in different systems
Peer-entity authentication
Data-origin authentication
Corroborates the sources of the data unit
Access control
limit and control access via communications links
Data confidentiality
protection of transmitted data from passive attacks and the protection of traffic flow from analysis.
Data integrity
total stream protection. Service can be with or without recovery
Keyless algorithm
cryptographic hash function which turns a variable amount of text into a small, fixed-length value (AKA hash value, hash code , digest)
Symmetric encryption algorithms
Encryption algorithms which use a single key (block or stream cypher) Also MAC (message authentication code)
Communications security
network protocols (IPsec, IEEE 802.11i WIFI, TSL, SSH)
the minimum necessary access that is required should be assigned for the shortest duration necessary. Automated privilege relinquish system and reassigning privilege after a set time.
Least privilege
‘security through obscurity’ doesn’t work. Alternatively, an open design gets assurance from many potential critics, so more chance to improve. Some secrecy is necessary, though make these secrets replaceable data rather than the algorithm itself. E.g. cryptographic keys
Open design
implementation of security in layers. Establish multiple layers of security controls and safeguards. Rather than establishing a control measure only at the entry point, better to have control measures at every critical point.
Defence in depth
an access authorisation scheme in which a subject’s right to access an object takes into consideration not just a privilege level but also the relevance of the data involved in the role the subject plays (or the job they perform)
Need to know
builds on the principle of least privilege. It requires the use of granular access permissions. For each type of privileged operation, there should be different roles in the system. It will ensure that the subject is only getting the essential roles and privileges
Separation of duties
the system should consist of a secure state where only certain essential operations can be performed , and all access are blocked. In an event of failure, the system should fall back to the secure state allowing only the essential tasks to repair and monitor the system.
Fail secure
the security mechanism should be as simple as possible. Complex system design makes it harder to audit and errors can easily be overlooked. In a simplified system, it is easier to audit, find errors and resolve them, So the system should be sufficiently small and simple to be verified and implemented
economy of mechanism
every access to every object must be checked for security and efficiency. Whenever a subject attempts to access an object , the system must check for privileges, of the action is permitted, the system will allow access, otherwise block access
Complete mediation