Information assurance and security Flashcards

1
Q

What is E-commerce?

A

Any transaction online, including online banking, software services, remote service providers, or online course platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key specifications of Real-world Security?

A
  • Specifications/policy : What is the system supposed to do
  • Implementation mechanism : How does it do it?
  • Correctness/assurance : Does it really work?
  • Human Nature : Can the system survive “clever users”?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What you might want in a software?

A

*Privacy
*Protection against phishing, vishing
*Integrity
*Authentication
*Authorization
*Confidentiality
*Non-repudiation
*Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is the protection against unauthorized modification or destruction of information.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensures that information is not disclosed to unauthorized persons.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of verifying the identity of a user, message, or originator.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides proof of data delivery and sender identity, so that neither party can later deny having processed the information.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the guarantee of timely, reliable access to data and information services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Availability refer to in information security?

A

Timely, reliable access to data and information services for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Integrity in the context of information security.

A

Protection against unauthorized modification or destruction of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Confidentiality in information security?

A

Assurance that information is not disclosed to unauthorized persons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Authentication?

A

Security measures to establish the validity of a transmission, message, or originator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Non-repudiation mean?

A

Assurance that the sender has proof of data delivery and the recipient has proof of the sender’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the types of assets in information security?

A
  • Physical assets: Devices, computers, people
  • Logical assets: Information, data, intellectual property
  • System Assets: Software, hardware, data, personnel resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an attack in the context of information security?

A

An attempt to gain access, cause damage to, or otherwise compromise information and/or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Passive attack?

A

An attack in which the attacker does not directly interact with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define an Active attack.

A

An attack in which the attacker directly interacts with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an Unintentional attack?

A

An attack where there is no deliberate goal of misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Exposure in information security?

A

An instance when the system is vulnerable to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does Compromise refer to?

A

A situation in which the attack has succeeded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a consequence of an attack?

A

The outcome of an attack, which may include disruption, corruption, or exploitation.

22
Q

What is meant by Disruption in the context of consequences?

A

Targets availability.

23
Q

What is meant by Corruption in the context of consequences?

A

Targets integrity.

24
Q

What is meant by Exploitation in the context of consequences?

A

Targets confidentiality.

25
Q

What is the definition of Authentication?

A

The process of recognizing a user’s identity.

26
Q

What is Authorization?

A

The process that determines what a user is able to do and see on a website.

27
Q

What is Malware?

A

Malicious software designed to disrupt, damage, or gain unauthorized access to systems.

28
Q

List examples of Malware.

A
  • Viruses
  • Worms
  • Ransomware
  • Trojans
  • Spyware
  • Adware
29
Q

What is Phishing?

A

Tricking individuals into providing sensitive information by pretending to be a trusted entity.

30
Q

What are common forms of Phishing?

A
  • Emails
  • Fake websites
  • SMS (‘smishing’)
  • Voice calls (‘vishing’)
31
Q

What is Social Engineering?

A

Exploiting human psychology to manipulate individuals into divulging confidential information.

32
Q

What are examples of Social Engineering?

A
  • Pretexting
  • Baiting
  • Tailgating
  • Quid pro quo attacks
33
Q

What are Denial of Services (DoS) Attacks?

A

Overloading systems or networks to make them unavailable to legitimate users.

34
Q

What are Man in the Middle (MITM) Attacks?

A

Intercepting communication between two parties to eavesdrop or alter data.

35
Q

What are Password Attacks?

A

Cracking or stealing passwords through brute force, dictionary attacks, or keylogging.

36
Q

What are Zero Day Exploits?

A

Exploiting software vulnerabilities before the vendor releases a patch.

37
Q

Define Cryptology.

A

The process of making and using codes to secure the transmission of information.

38
Q

Where did the word Cryptology came from?

A

Greek words Kryptos and Grahein
“Kryptos” means hidden
“Grahein” means to write

39
Q

Code Breaking

A

Cryptanalysis

40
Q

Code designing

A

Cryptography

41
Q

What does Cryptanalysis refer to?

A

The process of obtaining the original message from the encrypted message.

42
Q

What is cryptography?

A

The practice and study of encryption to prevent unauthorized reading of information.

43
Q

What does a cryptographic system typically include?

A
  • Private key cipher
  • Message integrity techniques
  • Secure identification/authentication techniques
44
Q

What is a Private Key cipher?

A

A cipher where the secret key is shared between two parties.

45
Q

What is a Public Key cipher?

A

A cipher where the secret key is not shared, allowing communication using public keys.

46
Q

What is the operation principle of the Caesar Cipher?

A

Each letter is translated into the letter a fixed number of positions after it in the alphabet.

47
Q

What is a Block Cipher?

A

Encrypts one fixed length group of bits at a time.

48
Q

What is the Electronic Codebook (ECB) mode?

A

The simplest encryption mode where each block is encrypted with the same key.

49
Q

What is Cipher Block Chaining (CBC)?

A

Each plaintext block is XORed with the previous ciphertext block, adding randomization.

50
Q

What is the Counter (CTR) mode?

A

Acts like a stream cipher, encrypting using the value of a counter.

51
Q

What is a Stream Cipher?

A

Encryption performed 1 bit or 1 byte at a time with a pseudo-random sequence.