Introduction Flashcards

1
Q

Security

A

Protecting assets from harm or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer security

A

Protecting information assets from damage or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information assets

A

Data files, software, IT equipment and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information security

A

The protection of information and its critical elements including systems and hardware that use, store, transmit that information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information security properties

A

Confidentiality, Integrity, Availability
Authenticity, Accountability, Non-repudiation, Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Repudiating meaning

A

Refuse to accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-repudiation meaning

A

Cannot repudiate with undeniable evidence.

Data integrity and origin can be verified by a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replaceable assets

A

Hardware, software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Irreplaceable assets

A

Data, individual application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality concepts

A

Data confidentiality and Privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity concepts

A

Data Integrity and System Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Availability goal

A

Ensure access and use of information is timely and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity goal

A

Guarding against improper information modification and destruction.

Ensure information non-repudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality goal

A

Preserving authorized restrictions on information access and disclosure

Protecting privacy and proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Confidentiality definition

A

Hiding the existence and concealment of information and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integrity definition

A

Authentication and trustworthiness of information and resources.

Correctness of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Availability definition

A

Ability to use info and resources.

Accessible and usable upon demand by an authorized entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Confidentiality (SECRECY)

A

Protecting business data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Confidentiality (PRIVACY)

A

Protecting personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Confidentiality (ANONYMITY)

A

Hide who is engaging in what actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Confidentiality Tools

A

Encryption

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Integrity tools

A

Prevention

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Availability tools

A

System design

Statistical model of use

24
Q

Confidentiality threat

A

Information theft

Unintentional disclosure

25
Integrity threats
Data and system corruption Loss of accountability
26
Availability threats
DoS
27
Authenticity types
User Organization System Data origin
28
Authenticity meaning
Being actually and exactly what is claimed
29
Accountability goal
Trace action to specific person and hold them responsible
30
Non-repudiation goal
Establishing irrefutable proof of message sending and receiving to third parties Origin - proof sent Deliver - proof received
31
Non-repudiation control
Digital signature
32
Vulnerabilities definition
State of being exposed to the possibility of being attacked or harmed Any condition that leaves an information system open to harm or weakness that makes an exploit possible
33
Vulnerabilities types
Hardware, Software, Data, Human, Computer security
34
Risk definition
Indicates exposure to the chance of damage A situation involving exposure to danger
35
Threat definition
Any event or action that can potentially cause damage to an asset Where intentional, unintentional or malicious
36
Potential threats
Unauthorized or unintentional access or change to data. Interruption of services. Interruption of access to assets. Damage to hardware. Unauthorized access or damage to facilities
37
MOM
Method Opportunity Motive
38
Types of harm
Interception Interruption Modification Fabrication
39
APT
Directed Well financed Organized Patient Silent Highly skilled
40
Breaches
Disclosure Disruption Deception Usurpation
41
Usurpation
Take authority by force
42
Available controls
Encryption Software/Program Development Hardware Physical Policies and Procedure
43
Breaches (DISCLOSURE)
Unauthorized access Snooping
44
Breaches (DECEPTION)
Accepting false data Modification, Spoofing, Repudiation of origin, Denial of receipt
45
Breaches (DISRUPTION)
Prevention of correct operation Modification, Man-in-the-middle
46
Breaches (USURPATION)
Unauthorized control of some part of the system Modification, Spoofing, Delay, DoS
47
Control Information states
Storage Processing Transmission
48
Control Categories
Physical Technical Administrative
49
Control Physical Category
Facility protection Security guards Locks Monitoring Intrusion Detection
50
Control Technical Category
Logical Access Control Cryptographic Control User Authentication Forensics Intrusion Detection
51
Control Administrative Category
Policies and Standard Procedures and Practice Awareness Training Incident Response
52
Functional Types
Preventive Detective Corrective
53
Control Goals
Prevention Detection Recovery
54
Threat Actors
Script Kiddies Hacktivists Organized Crime Nation States Insiders Competitors
55
Social Engineering
Impersonation Phishing Hoaxes
56
Social Engineering Principle
Consensus Authority Intimidation Scarcity Urgency Familiarity
57
Phishing
Spear Pharming Whaling Vishing Smishing