FUNDAMENTALS OF CYBERSECURITY Flashcards

AUTHORIZATION

1
Q

DEFINE AUTHORIZATION

A

ITS REFERS TO PRIVILEGES AND PERMISSIONS GRANTED TO USERS OR ENTITIES AFTER THEY HAVE BEEN AUTHENTICATED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PROVIDE THE MECHANISMS ON HOW TO IMPLEMENT AUTHORIZATION.

A
  1. ROLE- BASED
    2 RULE-BASED
    3 ATTRIBUTE-BASED
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BENEFITS OF AUTHORIZATION

A

1 PROTECT SENSITIVE DATA
2 MANTAIN SYSTEM INTEGRITY
3 PROVIDE MORE STREAMLINE USER EXPERIENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DEFINE ACCOUNTING

A

Accounting are security measures that ensure all users activities are properly recorded and tracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT ARE THE BENEFITS OF ACCOUNTING?

A

ENSUIRING TRANSPARENCY, SECURITY AND ACCOUNTABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT ARE THE ELEMENTS OF A GOOD ACCOUNTING SYSTEM

A

IT SHOULD ALLOW THE FOLLOWING
1 AUDIT TRAIL
2 REGULATORY COMPLIANCE
3 FORENSIC ANALYSIS
4 RESOURCE OPTIMIZATION
5 USER ACCOUNTABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT ARE THE TECHNOLOGIES USED FOR ACCOUNTING?

A

1 SIEMS (SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEM)-> IT PROVIDES REAL TIME ANALYSIS OF SECURITY ALERTS GENERATED BY HARDWARE AND SOFTWARE.
2 SYSLOG SERVERS(THEY AGGREGATE LOGS FROM VARIOUS NETWORK SYSTEMS AND DEVICES)
3 NETWORK ANALYSIS TOOL( THEY CAPTURE AND ANALYSE NETWORK TRAFFIC )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly