InfoSec_Deck-0.11959936320610942 Flashcards

1
Q

Elements of Information Security

A

Confidentiality, Integrity, Availability, Authenticity, Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality in information security?

A

Confidentiality is the assurance that information is accessible only to authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can confidentiality be maintained?

A

Through data classification, data encryption, and proper disposal of equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is integrity in information security?

A

Integrity is the trustworthiness of data or resources, ensuring they are not improperly or unauthorizedly changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can integrity be maintained?

A

Using checksums and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is availability in information security?

A

Availability is the assurance that systems are accessible when required by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can availability be maintained?

A

Using redundant systems, antivirus software, and DDoS prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is authenticity in information security?

A

Authenticity ensures that communication or data is genuine and uncorrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can authenticity be ensured?

A

Using biometrics, smart cards, and digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is non-repudiation in information security?

A

Non-repudiation guarantees that a message’s sender cannot deny having sent the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is non-repudiation ensured?

A

Using digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What motivates attackers in information security?

A

Disrupt business continuity, perform information theft, manipulate data, create fear, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are information security attacks classified?

A

Passive, active, close-in, insider, and distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a passive attack?

A

Passive attacks involve intercepting and monitoring network traffic without tampering with data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of passive attacks?

A

Footprinting, sniffing, network traffic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an active attack?

A

Active attacks tamper with data in transit or disrupt communication to break into secured systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of active attacks?

A

DoS attacks, malware attacks, spoofing, and more.

18
Q

What are close-in attacks?

A

Close-in attacks are performed when the attacker is physically close to the target system.

19
Q

Examples of close-in attacks?

A

Social engineering, eavesdropping, shoulder surfing.

20
Q

What are insider attacks?

A

Insider attacks are performed by trusted individuals with physical access to critical assets.

21
Q

Examples of insider attacks?

A

Data theft, eavesdropping, social engineering.

22
Q

What are distribution attacks?

A

Distribution attacks occur when attackers tamper with hardware or software before installation.

23
Q

Examples of distribution attacks?

A

Planting backdoors during production or distribution.

24
Q

What is information warfare?

A

The use of ICT for competitive advantages over an opponent.

25
Q

What are some forms of information warfare?

A

Command and control warfare, intelligence-based warfare, electronic warfare, and more.

26
Q

What is the CEH hacking methodology?

A

A step-by-step process followed by ethical hackers to perform hacking.

27
Q

What is footprinting in hacking?

A

Footprinting involves gathering information about a target to identify vulnerabilities.

28
Q

What is scanning in hacking?

A

Scanning identifies active hosts and open ports in the target network.

29
Q

What is enumeration in hacking?

A

Enumeration involves making active connections to a target system to gather information.

30
Q

What is vulnerability analysis?

A

The examination of a system’s ability to withstand assault by identifying security vulnerabilities.

31
Q

What is the cyber kill chain methodology?

A

A framework for identifying and preventing malicious intrusion activities.

32
Q

What is reconnaissance in the cyber kill chain?

A

The adversary collects information about the target to probe for weak points.

33
Q

What is weaponization in the cyber kill chain?

A

The adversary creates a tailored malicious payload based on identified vulnerabilities.

34
Q

What is delivery in the cyber kill chain?

A

The transmission of the malicious payload to the intended victim.

35
Q

What is exploitation in the cyber kill chain?

A

The malicious code exploits a vulnerability in the target system.

36
Q

What is installation in the cyber kill chain?

A

The adversary installs malicious software on the target system to maintain access.

37
Q

What is command and control in the cyber kill chain?

A

The adversary establishes a communication channel with the victim’s system.

38
Q

What are tactics in TTPs?

A

Tactics describe the way an attacker performs their attack from beginning to end.

39
Q

What are techniques in TTPs?

A

Techniques are the methods used by an attacker to achieve intermediate results during an attack.

40
Q

What are procedures in TTPs?

A

Procedures involve the sequence of actions performed by the threat actors to execute different steps of an attack.