Intro Flashcards

1
Q

what does CIA stand for in cyber security

A

Confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe C in CIA

A

C stands for confidentiality. Need to make sure data is secure when it is stored, transmitted and when being processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some key components of confidentiality in CIA

A

Need to make sure data is hidden and visible to authorize dusers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how can you enforce confidentiality

A

encryption - not making data available to unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describe I in CIA

A

Data must be accurate and complete and has not been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how is integrity enforced?

A

By hashes : summary or message of original data.- and comparing both hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe A in CIA

A

Availability: making sure data is available as and when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are violation of availability

A

damage web server or slow downs web server . slower down process times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how can availability be enforces

A

By redundancy: covering all bases - install multiple communication link so if some are affected you still have back ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does IAM stand for

A

Idetity and access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does IAAA stand for

A

identification, (name- not authentication), authentication ( proof who you are- ex. secret pin), authorization ( diff levels of access), accountability ( holder is accountable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the I in IAAA

A

Identification: a subject claims and identity e. id badge, retina,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the first A in IAAA

A

Authetication: a subject prooves identity
ex. password, pin or metric data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the phases in an identity lifecycle

A

1st- provisioning - ex. new accounts
2nd review- periodic account reviews- ex. person moves up
3rc- revocation- disable accounts of employee who leaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the types of authentication pass words

A

type 1- password, pin
type 2- mobile, sim , badge
type 3- something that you are- fingerprint, retina

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the best type of authetication

A

multifactor( combines more than 1) _ type 1 and type 2 - ex. password and mobile phone

17
Q

explain types of authentication

A

type 1- something you know
type 2- something u have
type 3 - something u are

18
Q

what is an identity federation

A

provide the relationship so redundant accounts are not created. use credentials from one account to log onto multiple systems /

19
Q

what are token based authentication

A

server will generate token and send to client

20
Q

what is single sign on

A

user logins in once and has access to everything on accounts ( within single organization)

21
Q

what are protocols used i authentication

A

SAML - standar dfor single sign on implementations
oauth- standard for authorization between parties
-OIDC- build on top of oauth , single sign off implementation

22
Q

what are the security governance to ensure decent and securie policies

A

policies, - broad, high level
standard - rukes to achieve intent of policies
procedures and guidelines - specific stesp to acienve consistency - train employes

23
Q

what is PII in security regulation

A

Personally identifuable information - ex. indentify, contact or locate someone

24
Q

what is PHI in security regulatioon

A

protected health information - ex.health information linked to someone

25
Q

what is GDPR regulation

A

protects general data

26
Q

what is HIPPA regulations

A

protect healthcare information

27
Q

what is PCI-DSS regulations

A

PROTECTS CREDIT CARD data

28
Q

how you can protect intellectual property

A

patentts, trademark, copyrights

29
Q

what is cryptography

A

the stude andapplication og methods and techniques to protect information by using codes for secure infromation

30
Q

what is cryptography

A

the study and application of methods and techniques to protect information by using codes for secure communication

31
Q

what are the two main cateogires for cryptography

A

1- symmetric encryption
2- Asymmetric encrption

32
Q

what is symetric cryptography

A

it also called private key encryption ( uses same key for encription and decryption
-the length determines the strength of the encryption (Ex- AES - Popular encryption algorythim)

33
Q

what is ciphertext

A

it is encrypted text created after using the secret code for encoding ( think of same key needed)

34
Q

what is asymmetric cyptography

A

it is a public key cryptography
-encrypt document using public key - and destination uses a secret key

35
Q

What happens in hashing

A

hashing created a fixed sized “summary” to ensure file integrity . an example of hashing digital signatures