Introduction Flashcards

1
Q

Security

A

Protecting assets from harm or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer security

A

Protecting information assets from damage or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information assets

A

Data files, software, IT equipment and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information security

A

The protection of information and its critical elements including systems and hardware that use, store, transmit that information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information security properties

A

Confidentiality, Integrity, Availability
Authenticity, Accountability, Non-repudiation, Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Repudiating meaning

A

Refuse to accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-repudiation meaning

A

Cannot repudiate with undeniable evidence.

Data integrity and origin can be verified by a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replaceable assets

A

Hardware, software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Irreplaceable assets

A

Data, individual application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality concepts

A

Data confidentiality and Privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity concepts

A

Data Integrity and System Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Availability goal

A

Ensure access and use of information is timely and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity goal

A

Guarding against improper information modification and destruction.

Ensure information non-repudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality goal

A

Preserving authorized restrictions on information access and disclosure

Protecting privacy and proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Confidentiality definition

A

Hiding the existence and concealment of information and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integrity definition

A

Authentication and trustworthiness of information and resources.

Correctness of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Availability definition

A

Ability to use info and resources.

Accessible and usable upon demand by an authorized entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Confidentiality (SECRECY)

A

Protecting business data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Confidentiality (PRIVACY)

A

Protecting personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Confidentiality (ANONYMITY)

A

Hide who is engaging in what actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Confidentiality Tools

A

Encryption

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Integrity tools

A

Prevention

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Availability tools

A

System design

Statistical model of use

24
Q

Confidentiality threat

A

Information theft

Unintentional disclosure

25
Q

Integrity threats

A

Data and system corruption

Loss of accountability

26
Q

Availability threats

A

DoS

27
Q

Authenticity types

A

User
Organization
System
Data origin

28
Q

Authenticity meaning

A

Being actually and exactly what is claimed

29
Q

Accountability goal

A

Trace action to specific person and hold them responsible

30
Q

Non-repudiation goal

A

Establishing irrefutable proof of message sending and receiving to third parties

Origin - proof sent
Deliver - proof received

31
Q

Non-repudiation control

A

Digital signature

32
Q

Vulnerabilities definition

A

State of being exposed to the possibility of being attacked or harmed

Any condition that leaves an information system open to harm or weakness that makes an exploit possible

33
Q

Vulnerabilities types

A

Hardware, Software, Data, Human, Computer security

34
Q

Risk definition

A

Indicates exposure to the chance of damage

A situation involving exposure to danger

35
Q

Threat definition

A

Any event or action that can potentially cause damage to an asset

Where intentional, unintentional or malicious

36
Q

Potential threats

A

Unauthorized or unintentional access or change to data.
Interruption of services.
Interruption of access to assets.
Damage to hardware.
Unauthorized access or damage to facilities

37
Q

MOM

A

Method
Opportunity
Motive

38
Q

Types of harm

A

Interception
Interruption
Modification
Fabrication

39
Q

APT

A

Directed
Well financed
Organized
Patient
Silent
Highly skilled

40
Q

Breaches

A

Disclosure
Disruption
Deception
Usurpation

41
Q

Usurpation

A

Take authority by force

42
Q

Available controls

A

Encryption
Software/Program
Development
Hardware
Physical
Policies and Procedure

43
Q

Breaches (DISCLOSURE)

A

Unauthorized access

Snooping

44
Q

Breaches (DECEPTION)

A

Accepting false data

Modification, Spoofing, Repudiation of origin, Denial of receipt

45
Q

Breaches (DISRUPTION)

A

Prevention of correct operation

Modification, Man-in-the-middle

46
Q

Breaches (USURPATION)

A

Unauthorized control of some part of the system

Modification, Spoofing, Delay, DoS

47
Q

Control Information states

A

Storage
Processing
Transmission

48
Q

Control Categories

A

Physical
Technical
Administrative

49
Q

Control Physical Category

A

Facility protection
Security guards
Locks
Monitoring
Intrusion Detection

50
Q

Control Technical Category

A

Logical Access Control
Cryptographic Control
User Authentication
Forensics
Intrusion Detection

51
Q

Control Administrative Category

A

Policies and Standard
Procedures and Practice
Awareness Training
Incident Response

52
Q

Functional Types

A

Preventive
Detective
Corrective

53
Q

Control Goals

A

Prevention
Detection
Recovery

54
Q

Threat Actors

A

Script Kiddies
Hacktivists
Organized Crime
Nation States
Insiders
Competitors

55
Q

Social Engineering

A

Impersonation
Phishing
Hoaxes

56
Q

Social Engineering Principle

A

Consensus
Authority
Intimidation
Scarcity
Urgency
Familiarity

57
Q

Phishing

A

Spear
Pharming
Whaling
Vishing
Smishing