Exam Study Cards Flashcards
What are the primary objectives/goals of security?
To maintain confidentiality, Integrity, Availability (CIA)
What is confidentiality?
Confidentiality means that objects should not be disclosed to subjects that do not have authorization.
What is integrity?
Integrity means that data/objects remain unchanged and are not intentionally altered by unauthorized subjects.
What is availability?
Availability means that the subjects that are authorized have consistent and uninterrupted access to objects.
What is the CIA triad?
The CIA triad contains the concepts of confidentiality, integrity, and availability, which are the three vital principles of security.
What is identification and how does it work?
Identification is what a subject has to provide to a system in the first step of gaining authentication, authorization and accountability.
What is authentication and how does it work?
Authentication means to verify that the identity entered into the system is valid. Information (password) is entered by the subject after providing identification (login ID) and the two must correspond to each other to gain access.
What is security governance?
Security governance is the collection of practices related to defining, guiding, and supporting organizational security efforts.
What is auditing and how does it work?
Auditing is the systematic way for subjects to be held accountable for any actions they performed as authorized users of a system. Auditing detects unauthorized or nefarious activities on a system. Auditing also keeps track of attempted intrusions and any system failures/outages. Because of its tracking mechanisms, auditing can produce logs and analysis of those logs as well as provide them for prosecution evidence.
What is accountability?
Accountability holds subjects accountable for their actions. Accountability can only successfully work once identity is authenticated. Security policies need accountability in order to be enforced.
What is nonrepudiation?
This ensures that a subject cannot deny that they performed an action or an event occurred.
What kind of plans are included in security management and what do they do?
Strategic plans - long-term and stable, defining the goals, missions, and objectives of the organization.
Tactical plans - mid-term plans that are formed to provide a more detailed account on how to accomplish the goals in the strategic plan.
Operational plans - short-term and very detailed and concise plans that revolve around strategic and tactical plans.
What is data remanence?
This is the data that was deleted but actually ends up remaining until it is overwritten.
What can you do to eliminate residual data that still remains after it was deleted?
Clearing Purging Degaussing Overwrite with 1's and 0's Destruction Encryption
What is the most valuable asset to an organization?
People. Any risk that involves the loss of life is the highest risk and must be mitigated.
What is ROI?
The amount of money saved by implementing a safeguard. If the annual total cost of ownership (TCO) than the annual loss expectancy (ALE), this equates to a positive ROI.
What are the objectives/goals of information risk management?
- Identify assets and their value
- Identify the vulnerabilities and threats to the assets
- Quantify the probability and business impacts of potential threats (risks)
- Determine the needs
- Deploy a positive ROI safeguard
- Monitor and evaluate systems and practice
- Promote and spread security awareness
What does encryption provide?
Confidentiality by denying unauthorized reads.
Authenticity by validating the source of the message to ensure the sender is who they proclaim to be.
Integrity by denying unauthorized writes AND assurance that the message was not modified.
Non-repudiation by establishing that a subject cannot deny performing an action.
What is Kerckhoff’s Principle?
Principle that maintains that only the key should be kept secret while algorithms are publicly known.
What is a unbreakable cipher?
A one-time pad.
What is hybrid encryption?
Using symmetric to encrypt messages and asymmetric to encrypt the symmetric key
What is a digital certificate?
A public key signed with a digital signature.
What is HMAC?
HMAC (Hashed Message Authentication Code) gives integrity and authenticity by combining symmetric encryption with hashing. It is used by IPSec.
What is an APT group?
An APT (Advanced Persistent Threat) group has the ability to coordinate very sophisticated attacks.