Information Security Flashcards
1
Q
5 ways to Analyse/Define a Risk
A
- Assets (value of what we want to protect)
- Vulnerabilty (weaknesses that make an attack possible
- Threats (dangers to assets, they take advantage of vulnerabilities)
- Attack (violation of security)
- Countermeasures (how to prevent attacks)
2
Q
How do we quantify the risk of an asset?
A
- Look at likelihood of attack
- Probability of successful attack
- Impact of successful attack
3
Q
12 different types of Security Vulnerabilities
A
- Backdoors
- Direct access (unsecured networks, lost flashdrives)
- Spoofing (keyloggers)
- Trojans, viruses, worms
- Privilege escalation
- Denial of Service (overload bandwidth to trigger lockout)
- Clickjacking (redirecting to fake websites)
- Social Engineering (phising, baiting)
- Media Manipulation
- Troll armies
- Astroturfing (combo of above to create fake popular opinion)
4
Q
8 types of Security Countermeasures
A
- Authentication & Authorisation
- Multi-factor authentication
- Firewalls
- Secure networking (https)
- Physical separation
- Cryptography
- Intrusion detection
- Formal Verification