Cybersecurity Flashcards

1
Q

Confidentiality

A

data confidentiality + privacy
Data confidentiality: private or confidential information is not made available or
disclosed to unauthorized individuals.
o Privacy : individuals control or influence what information related to them may be
collected and stored and by whom and to whom that information may be
disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Data integrity: information and programs are changed only in a specified and
authorized manner.
o System integrity: system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

assures that systems work promptly and

service is not denied to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Levels of Impact

A

Low, Moderate and HIgh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ccryptography

A

which leverages hard mathematical problems with “trap door” information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Assets of computer

A

Hardware, software, Data, communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adversary (threat)agent

A

Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Policy

A

A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to
maintain a condition of security for systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or
reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access,
destruction, disclosure, modification of information, and/or denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerability

A

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or
triggered by a threat source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Categories of vulnerabilities

A
  • Corrupted (loss of integrity)
  • Leaky (loss of confidentiality)
  • Unavailable or very slow (loss of availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of Attacks

A

Passive Attack – attempt to learn or make use of information from the
system that does not affect system resources
• Active Attack – attempt to alter system resources or affect their
operation
• Insider Attack – initiated by an entity inside the security parameter
• Outsider Attack – initiated from outside the perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Counter measure

A
• prevent (best option)
o Cryptography, air gap
• detect / respond
o intrusion detection
o turn off services, trace intruder
• recover
o you do make backups, right? Right!?
• residual vulnerabilities
o countermeasures can introduce new vulnerability
o goal is to minimize residuals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

implications of IT-configured society

A

o Global many-to-many scope
o Special identity conditions
o Reproducibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Look at 41 slide for chapter 1

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk
management
techniques:

A

Accept
o Mitigate
o Avoid
o Deflect

17
Q

Fundamental security design principles

A

page 48

18
Q

Psychological Acceptability

Fail Example

A

o Hard for humans to remember, easy for computer to brute force
o Password strength requirements (length, complexity, and regular password
changes) perpetuated the problem

Would be better to:
o Passphrases: easier for human to remember, harder for computers to guess

19
Q

Attack Surface

A

Consist of the reachable and exploitable vulnerabilities in

a system

20
Q

Attack surface categories

A

Network
Software
Human

21
Q

Attack Tree Idea

A

branching hierarchical data structure that
represents a set of potential techniques for exploiting
security vulnerabilities.

22
Q

Attack tree whole process

A

Root node = attacker objective
Intermediate nodes = Subgoals
Leaf node = different ways to initiate attack
Branches = can be labeled with difficult, cost, or other attack attributes

Note = risk = probability * impact

23
Q

Computer security strategy

A

Security Policy
Security implementation
Assurance
Evaluation