Information Security Flashcards

1
Q

What is the CIA triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does data Confidentiality mean?

A

This can refer to data confidentiality: private or confidential information is not made available or disclosed to unauthorized individuals

Privacy - individuals control or influence what information related to them is collected and stored and by whom. And who that information may be shared with.

Example: Student records kept private. FERPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Integrity?

A

Assures that information and programs are changed only in a specified and authorized manner.

Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

Example: Incorrect data in a database could have negative impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is availability?

A

Assures that systems work promptly and service is not denied to authorized users.

Example: School website is up and available to users when they need it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authenticity?

A

Verifying that users are who they say they are and that each input arriving at the system is from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Accountability?

A

The security goal that generates the requirement for actions of that entity to be traced uniquely to that entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does it mean for something to have low breach impact?

A

The loss could be expected to have limited adverse effect on an organization’s operations, assets, or individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does it mean for something to have medium or moderate breach impact?

A

The loss could be expected to have a serious adverse effect on organizational operations, assets, or individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does it mean for something to have high breach impact?

A

The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, assets, or individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some computer security challenges?

A
  • Solutions are often complex
  • require constant monitoring
  • is often an afterthought
  • little perceived benefit
  • constant battle between perpetrators and the security specialist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a security attack?

A

Any action that compromises the security of information owned by an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a security mechanism?

A

A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a security service?

A

A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.

Intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between a threat and an attack?

A

Threat - A possible danger that might exploit a vulnerability

Attack- An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt to evade security services or policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two different types of security attacks?

A

Passive - gathering information from the system but not physically affecting the resources themselves

Active- attempt to alter system resources or affect their operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Nonrepudiation?

A

When someone can’t deny the authenticity of something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is ISOC?

A

Internet Society - professional membership society responsible for internet infrastructure standards including the IETF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some characteristics of a firewall?

A

All traffic must pass through it

Only authorized traffic will be allowed to pass.

The firewall itself should be immune to penetration

There can be more than one in an organization.

19
Q

What is IP address spoofing?

A

The intruder transmits packets from the outside with a source IP address field containing the address of an internal host.

20
Q

What is a countermeasure for IP spoofing?

A

Discard packets with internal source IP if they arrive at external opening.

21
Q

What is a source routing attack?

A

The source station specifies the route that a packet should take as it crosses the internet, in the hopes that this will bypass security measures that do not analyze the source routing information

A countermeasure is to discard all packets that use this option.

22
Q

What is a tiny fragment attack?

A

The intruder uses the IP fragmentation option to create extremely small fragments and force the TCP header information into a seperate packer fragment.

A countermeasure is to enforce a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.

23
Q

What is an application level gateway or application proxy?

A

A filter of application-level traffic

Tend to be more secure than packet filters

Additional processing overhead necessary on each connection

24
Q

What is plaintext?

A

The original text of the message

25
Q

What is ciphertext?

A

The encoded message

26
Q

What is a cipher?

A

An algorithm for translating plaintext to ciphertext

27
Q

What is a key?

A

Info used in cipher known only to the sender or receiver

28
Q

What is cryptography?

A

The study of encryption principles and methods

29
Q

What is cryptanalysis?

A

Code breaking - study of principles or methods of deciphering ciphertext without knowing key

30
Q

What is cryptology?

A

The study of both encryption and decryption

31
Q

How does symmetric encryption work?

A

Both sender and receiver share a key used to both encrypt and decrypt the message being sent.

  • A strong encryption algorithm is required
  • sender and receiver must have received the key in a secret fashion.
32
Q

What is substitution in terms of cryptography?

A

elements of the plaintext are mapped to another element.

33
Q

What is transposition in terms of cryptography?

A

Elements of the plaintext are rearranged

34
Q

An encryption scheme is computationally secure if…

A

The cost of breaking the cipher exceeds the value of the information

The time required to break the cipher exceeds the useful lifetime of the information.

35
Q

What goes into a risk management process?

A
  • Determine what is at risk
  • Determine the rough value
  • Determine for each asset the threats
  • Determine an appropriate response

-monitor and control risk

36
Q

What is SLE ?

A

Single Loss Expectancy

Asset value * Exposure factor

37
Q

What is ALE?

A

Annualized Loss Expectancy

SLE * Rate of occurrence

38
Q

What is a rootkit?

A

A set of hacker tools used after attacker has broken into a computer system and gained root access.

39
Q

Malware can be classified into two broad categories…

A

Based on how it spreads or propagates

actions it takes once the target is reached.

40
Q

What is a auto rooter?

A

Malicious hacker tools used to break into new systems remotely.

41
Q

What is a kit (virus generator)?

A

set of tools for generating new viruses automatically.

42
Q

What is a backdoor?

A

A means of bypassing security measures to gain access to unauthorized functionalities.

43
Q

What is an infection vector?

A

The means by which a virus spreads or propagates

44
Q

What is the payload in terms of a virus?

A

What the virus does besides spreading. May involve damage or benign but noticeable activity.