Domain 1 Chapter 2 Flashcards

1
Q

What is CIA TRIAD?

A

Confidentiality,Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA TRIAD

A

The CIA Triad
* Combination of principles
– The fundamentals of security
– Sometimes referenced as the AIC Triad
* Confidentiality
– Prevent disclosure of information to
unauthorized individuals or systems
* Integrity
– Messages can’t be modified without detection
* Availability
– Systems and networks must be up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A
  • Certain information should only be known
    to certain people
    – Prevent unauthorized information disclosure
  • Encryption
    – Encode messages so only certain people
    can read it
  • Access controls
    – Selectively restrict access to a resource
  • Two-factor authentication
    – Additional confirmation before information
    is disclosed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Integrity
* Data is stored and transferred as intended
– Any modification to the data would be identified
* Hashing
– Map data of an arbitrary length to data of a fixed length
* Digital signatures
– Mathematical scheme to verify the integrity of data
* Certificates
– Combine with a digital signature to verify an individual
* Non-repudiation
– Provides proof of integrity, can be asserted to be genuine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Information is accessible to authorized users
– Always at your fingertips
* Redundancy
– Build services that will always be available
* Fault tolerance
– System will continue to run, even when a failure occurs
* Patching
– Stability
– Close security holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non Repudiation

A

Prevents denial of action, ensuring accountability and reliability in electronic transaction and communication

Key aspects : Digital Signatures
Audit trails
Access controls
Identification
Security Identifier(SID)
Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAA

A

Authentication, Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AAA framework

A
  • Identification
    – This is who you claim to be
    – Usually your username
  • Authentication
    – Prove you are who you say you are
    – Password and other authentication factors
  • Authorization
    – Based on your identification and authentication,
    what access do you have?
  • Accounting
    – Resources used: Login time, data sent and
    received, logout time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authenticating systems

A

Put a digitally signed certificate on the device
* Other business processes rely on the certificate
– Access to the VPN from authorized devices
– Management software can validate the end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Certificate authentication

A

An organization has a trusted Certificate Authority (CA)
– Most organizations maintain their own CAs
* The organization creates a certificate for a device
– And digitally signs the certificate with the organization’s CA
* The certificate can now be included on a device as an
authentication factor
– The CA’s digital signature is used to validate the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authorization models

A

define the scope of permissible activities, creating a controlled enviroment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RADIUS

A

Remote Authentication Dial in user service(safeguard the exchange of data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TACACS

A

Terminal Access Controller Access Control System Plus, grant or deny access to network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly