INFO310FINAL Flashcards
Goal of Cybersecurity
Protection of Assets, Prevention Detection, and Recovery
CIA
confidentiality, Integrity, Availability.
Confidentiality (CIA)
the concealment of information or resources
Integrity (CIA)
the trustworthiness of data or resources
Availability (CIA)
Availability: the ability to use information or resources
Categories of Threats
Deception, Disruption, Disclosure, Usurpation
Deception (Category of threat)
The acceptance of false data
Disruption (Category of threat)
the interruption or prevention of correct operation
Disclosure (Category of threat)
The unauthorized access to information
Usurpation (Category of threat)
the unauthorized control of some part of a system
Snooping or eavesdropping (Type of threat)
the unauthorized interception of information, is a form of disclosure
Modification or alteration (Type of threat)
an unauthorized change of information is a form of usurpation, deception, and disclosure.
Masquerading or spoofing (Type of threat)
an impersonation of one entity by another, is a form of both deception and usurpation.
Repudiation of origin
a false denial that an entity sent (or created) something, is a form of deception.
Denial of receipt
a false denial that an entity received some information or mes- sage, is a form of deception
Delay
a temporary inhibition of a service, is a form of usurpation, al- though it can play a supporting role in deception.
Denial of service
a long-term inhibition of service, is a form of usurpation often also used as a mechanism of deception.
The Core of Cybersecurity
Asset, Threat, Vulnerability, Risk
Asset
People, property, and information of value
Threat
Anything that can exploit a vulnerability, intentionally or acciden- tally, and obtain, damage, or destroy an asset.
Vulnerability
Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Risk
The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
Formula for calculating risk
Asset + Threat + Vulnerability = Risk.
Polyalphabetic Ciphers
Any cipher based on substitution, using multiple substitution alphabets.
Scytale Encryption
message wrapped around a rod of a certain size then can be read.
Transposition Ciphers
A method of encryption by which the positions held by units of plaintext […] are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.
Frequency Analysis
The study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.
Social Engineering
s the art or better yet, science, of skillfully maneuvering human beings to take action in some aspect of their lives.
Phishing (SE)
The practice of sending emails appearing to be from reputable sources with the goal of influencing or gaining personal information.
Vishing (SE)
The practice of eliciting information or attempting to influence action via the telephone, may include such tools as phone spoofing.
Impersonation (SE)
The practice of pretexting as another person with the goal of obtaining information or access to a person, company, or computer system
Properties of encryption
· Ensures Authentication · Ensures Non-Repudiation · Ensures Confidentiality · Ensures Integrity
Secret Key Cryptography (SKC) (AKA Symmetric Encryption)
Uses a single key for both encryption and decryption
Public Key Cryptography (PKC) (AKA Asymmetric Encryption)
Uses one key for encryption and another for decryption
Hash Functions (AKA Checksum)
Uses a mathematical transformation to create a digital fingerprint or message digest
The Layers of the Internet Protocol Model
Physical, Link, Network, Transport, and Application
Physical layer IPM
Wire, open air, optic fibers
Link layer IPM
Ethernet, Wifi, 4G
Network layer IPM
Internet protocol, inter control ICMP (nter Control Messaging Protocol)
Transport Layer (IPM)
Transmission Control Protocol (TCP) User Datagram Protocol (UDP)
Application Layer IPM
Email > Simple Mail Transfer Protocol (SMTP) - Websites>HyperText Transfer Protocol (HTTP) -File Sharing>File Transfer Protocol (FTP)>Server Message Block (smb)
Public IP
public domain on the internet. Created by Internet Service Providers (ISP) to connect to other ISPs around the world. Creates the internet.
Private IP
private to a Local Area Network (LAN). Private IPs are assigned in a LAN by the Dynamic Host Configuration Protocol (DHCP).
Internet Protocol (IP) Address
it is a unique identifier. An IP address has two components: the network address and the host address. A subnet mask then sep- arates the IP address into network and host addresses.
Authentication
the process of verifying that an individual, entity or website is who it claims to be. Authentication in the context of web applications is commonly performed by submitting a username or ID and one or more items of private information that only a given user should know
Credential
An attestation of identity, qualification, competence, or authority issued to an individual by a third party
Web Session
sequence of network HTTP request and response transactions associated to the same user. […] sessions provide the ability to establish variables - such as access rights and localization settings - which will apply to each and every interaction a user has with the web application for the duration of the session.
Client side code
is almost exclusively in Javascript (JS) runs with an interpreter. Makes web pages come alive. Credential information is stored and sent from the client
Server Side
Server side services listen for a request and then respond to that request part of the N-tier application design
N-Tier Application
Presentation, logic, data
Presentation tier
Translates data in to something the user can understand
Logic Tier
Coordinates the application, processes commands makes logical decisions and evaluations and performs calculations. Provides communication between the presentation and data tier
Data Tier
Information is stored and retrieved from a database, datastore or filesystem. Provides information back to the logic tier
Hub
does nothing except provide a pathway for the electrical signals to travel along
Switch
are the connectivity points of an Ethernet network that forward data only to the port that connects to the destination device. It does this by learning the MAC address of the devices attached to it, and then by matching the destination MAC address in the data it receives.
Router
ill normally create, add, or divide on the Network Layer as they are normally IP-based devices.Receives a packet of data, it reads the header of the packet to define the destination address
Wireless Access Point
use the wireless infrastructure network mode to provide a connection point between WLANs and a wired Ethernet LAN.