Exam 1 Flashcards

1
Q

What is cybersecurity?

A

Protection of networked system and data from unauthorized use or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

offline identity is?

A

your identity that interacts on a regular basis at home, school or work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Online identity is?

A

Your identity while you are in cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

your data is?

A

medical records, education recors and emplyment and financial records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how to the criminals get your money?

A

online credentials and creative schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

goals of cybersecurity?

A

confidentiallity, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ruined reputation, vandalism, theft, revenue lost and damaged intellectual property are

A

impacts of a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

who is the most dangerous attacker

A

script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the most common type of security attacks?

A

internal security attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is cyberwarfare

A

use to gain advantage over adversaries, nations or competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is risk managment

A

A process aiming at an efficient balance between realizing opportunities for gains while minimizing vulnerabilities and losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What it is for and the focus of OCTAVE

A

A risk based stategic assessment and planning technique for security and is focused on strategic, and practice related issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SP-800-30 NIS Explain what is for and its focus

A

Is a guide for conducting risk assessments of federal information systems and organizations and is focus is to provide senior leaders with the information needed to determine appropiate courses of action in response to identified risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

explain the difference between qualitative and cuantitative risk managment

A

qualitative risk does not analyze the risks mathematically to identify the probability meanwhile quantitative uses probability to characterize the risk probability and impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the steps for cuantitative risk managment

A

Determine the asset value, identify threats to the asset, determine the exposure factor, calculate the single loss expectancy, calculate the annualized rate of occurance and calculate the annualized loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how do you calculate the asset value?

A

based on their book values and replacement costs

17
Q

what is the exposure factor? and how do you compute it?

A

A subjective potential percentage of loss to a specific asset if a specific threat is realized and is calculated by the vulnerability and its consequences to the asset when the threat occurs

18
Q

how do you calculate the ALE and what is it for?

A

Is the annual expected financial loss to an organization’s information asset because of a particular threat occurring within that same calendar year. It is calculated as ALE = SLE x ARO

19
Q

What is Cryptography, Cryptology and Cryproanalysis

A

Cryptography: the art of writing and solving codes, cryptoanalisis: act of studying a cryptographic algorithm, to try to break the protection of encryption and cryptology: inventing codes and breaking them

20
Q

Substitution and Transposition are types of cyphers?

A

Yes

21
Q

Transposition is

A

rearranging the order of the ciphertext to break any repeating patterns in the
underlying plaintext.

22
Q

subtitution is

A

one set of bits is exchanged for another.

23
Q

confusion is

A

The interceptor should not be able to predict what will happen to the ciphertext by changing
one character in the plaintext.

24
Q

diffusion is

A

The cipher should also spread the information from the plaintext over the entire ciphertext so
that changes in the plaintext affect many parts of the ciphertext.

25
Q

Explain symmetric Cryptography

A

Everyone who knows k knows the full secret

26
Q

What is the difference between: Message Privacy and Message Authenticity and Integrity

A

Privacy is not knwoing the message because of protection of the medium and message authentification code is Only people with the
private key k could have sent the message.

27
Q

A symmetric key cipher consust of 3 polynomial time algorithms

A

KeyGen(l), E(k,m), and D(k,c):

28
Q

One time pad is a pure transposition cypher

A

True

29
Q

One Time Pad and Vernam are different algoritms

A

False

30
Q

Is this True for all cyphers?

A

True