Fundamentals IT Flashcards

1
Q

Ceasar Cipher

A

An encryption that is subsituition cipher which requires you to shift letter a certain amount to decipher as letter were replaced by other letters to cipher the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Kerckhoff’s Principles

A

6 principles that should serve as the basis for all cryptographic systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric cryptography

A

uses a single key to both encrypt the plaintext and decrypt the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric cryptography

A

uses 2 keys, a public and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Block Cipher

A

take predetermined number of bits like binary numbers which is a block and encrpts the block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stream Cipher

A

encypts each bit of plaintext one bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECC ( elliptic curve cyptography}

A

use short keys while maintaining a higher cyptography strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES

A

a block cipher that use 56 bits, the lenght of the key determines the strength of the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3DES

A

3DES uses 3 round of DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Detterence

A

letting people or employees known that they will be held accountable for their actions if they step out of line dettering them from even trying to have bad intentions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The brewer and nash model

A

if you access (A) files you lose access to (B) files and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Biba Model

A

those with high level access cannot have access to lower classification and those with lower classification cannot alter higher classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribute Based Access Control

A

specific attributes of a person, resource, or environment have access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mandatory Access control

A

the owner doesn’t get decide who has access, but a seperate group or individual has the authority to set who accesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DAC (Discretionary access control)

A

the owner gets to decide who hass access and what level of access they have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Capabilities

A

a user’s token or key known as capability also could be like a badge to enter. The capability is that everyone can enter the same door but others have the capability to enter anytime while others only can enter on a specific timeframe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Clickjacking

A

an attacker must hold some portion of a website control and place a invinsible layer on top of something a person might click which executes a command to do what the attacker wants like make purchases or steal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Black Holes

A

large scale filtering which traffic is sent to filtered destinations which appear to have vanished into a black hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FAR (False acceptance rate)

A

how often you accept a user who should be rejected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FRR (false rejection rate)

A

how often we reject a legitimate user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Mutual Authentication

A

authenitcation methos where both parties in a transaction authenticate each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Entropy in passwords

A

classic strong contruction scheme of creating passwords 8 characters or longer which us symbols, numbers, charcters, lower and uppercase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fabrication attack

A

generating fake information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Interception attack

A

affects confidentiality, take forms of unauthorized viewing, copying, eavesdropping, reading someone elses’ email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Modification attack

A

modifies or tampers with data of a file or other information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Interrupption attack

A

makes assets unusable or unavailable for a set period of time or permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Pakerian Hexad

A

uses CIA Triad model but also inludes 3 more models, possesion of control, autheniticity, and utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Possesion of control

A

physical disposition of media on which data is stored,

29
Q

Authenticity

A

allows to say whether you’ve attributed the data to the proper owner or cretor

30
Q

Utility

A

how useful a data is to you

31
Q
A
32
Q

Regulatory Compliance

A

adherence to the laws to the specific industry that you are operating in

33
Q

Industry Compliance

A

regulations that are not mandated by law but have severe consequences to your business if not being compliant

34
Q

PCI DSS (Payment Card Industry Data Security Standard)

A

regulations that govern proccessing credit cards any info associated with the card

35
Q

FISMA (Federal Information Security Management Act)

A

applies to all federal agencies to implement security controls

36
Q

SOX (Sarbanes Oxley Act)

A

regulates financial data operstions and assets for publiclicly held companies

37
Q

GLBA (Gramm Leach Bliley Act)

A

aims to protect (PII) Personal identifiable information

38
Q

CIPA (Childrens Internet Protection Act)

A

requires schools and libraries to prevent from children accessing harmful content on the internet

39
Q

COPPA (Childrens Online Privacy Protection Act)

A

protects minors younger than 13 by restricting organizations from collecting PII

40
Q

FERPA (Family Educational Rights and Privacy Act)

A

protects students records once students turn 18 the rights to the records shift from the parents to the students

41
Q

GDPR (General Data Protection Regulation)

A

cover data protection and privacy for all individuals in the European Union

42
Q

Laws of OPSEC

A

First law: if you don’t know the threat how do you know what to protect?

Second Law: if you don’t know what you are protecting then how do you know you are protecting it?

Third Law:if you are not protecting it, the DRAGON WINS

43
Q

Competitive intellegence

A

conducting intelligence gathering information to make business decisions

44
Q

Pretexting

A

atttacker use information gathered to disguise as a manager, customer, reporter,etc. to convince targets to give up senstive information

45
Q

Phishing

A

attacker uses communications apps like, email, phone calls, texts and try to get user to click on a malicious link that contain malware

46
Q

RAID (Redundant Array of Independant Disks)

A

takes multiple hard drives and allows them to be used a one large hard drive with benefits

47
Q

Firewall

A

network security that maintains control of traffic that flow in and out of networks

48
Q

Packet Filtering

A

the firewall looks at the contents of each packet entering and decides whether to allows or disallows it

49
Q

Stateful Packet Inspection

A

watches traffic over a given connection

50
Q

Deep Packet Inspection

A

the same as stateful packet inspection but goes futher with actually inspecting the contents in the packet

51
Q

Proxy Servers

A

provides a layer of security on devices usually on apps like mail or web browsing and adds choke points

52
Q

DMZ(Demilitirized zone)

A

seperate a device from the rest of the network as and example of INTRANET zone, Extranet zone, and Internet

53
Q

Scanners

A

hardware or software tools that enable you to interrogate devices and networks for information. Like a port scanners that scans info on ports and vulnurability scanners to find weak points in a system

54
Q

Packet Sniffers

A

a tool that can intercept traffic on a network and see if you were intended to recieve it or not

55
Q

Honeypot

A

are bait as a fake vulnerability where attackers are tricked to think that thst they are attacked the real thing but instead they are being monitored and observed on how they carry attacks and learn on how they think

56
Q

Operating system hardening

A

reducing every way vulnerabilites can be exposed to attackers by, uninstalling software not being used, closing ports that arn’t used, adding anti virus software, perform updates, adding principle of least privledge, turn on logging and auditing

57
Q

Buffer Overflow

A

when you put in ore data that the application is expecting, example you put in 10 digits when the app only requires 8 digits in the field

58
Q

Jailbreaking

A

modifying and removing restrictions on a device bypass security features

59
Q

Authentication attacks

A

attacks tha attempt to gain access to resouces without the proper credentials to do so

60
Q

Authorization attacks

A

attack to gain access to resources without the proper authorization to do so

61
Q

Client side attacks

A

attacks that take advantage of weaknesses on software loaded users clients or social enginering on clients

62
Q

Server side attacks

A

vulnerabilities on the server side of transactions, web server, software and its version, scripting languages

63
Q

Arbitrary code exection

A

attackers have the ability to execute commands on a system they choose without restriction they are able to do this because of secuirty flaws in scripting languages

64
Q

Priviledge Escalation

A

attacks that increase the level of access of what you are authorized, to gain higher access control to carry out attacks on a higher level

65
Q

Black Box

A

penetration texting where the tester has no knowledge environment or entity

66
Q

Grey Box

A

penetration testing where the tester has some insider knowledge of the environment but not everything

67
Q

White box

A

penetration testing where the tester has all insider knowledge of the environment

68
Q

Bug bounty programs

A

an organizations offers rewards to individuals who find vulnertbilities in their resouces, depending on severtiy of the bug they will get compensated with monetary value or other ways

69
Q
A