IS3110 CHAP 9 Flashcards
The standard defined by NIST for symmetric encryption. It is fast, efficient, and commonly used to encrypt data on drives, including universal serial bus (USB) flash drives.
Advanced Encryption Standard (AES)
Files that are used for security. Uses include identification and encryption. They can be issued to users or systems and are then presented to other entities. It includes a public key that is shared with other. The public key is matched with a private key that is always kept private.
Certificates
An entity that issues and manages certificates. ___ can be public or private. Public CAs are accessible on the Internet. Private CAs are internal to an organization. CA are used by users and systems for security purposes, such as identification and encryption.
Certification authority (CA)
A class of control identified by its function. It attempts to reverse the effect of an exploited vulnerability. For example, antivirus software can work as a ___ if it detects an infected file.
Corrective control
A class of control identified by its function. It will detect when a vulnerability is being exploited. IDS is an example of a ___.
Detective control
A method used for identification. This ___ uses certificates issued by a CA. A hash of a message is created. The hash is encrypted with the sender’s private key. If the receiver can decrypt the encrypted hash with the sender’s public key, it has been verified that it was encrypted and sent with the sender’s private key. Only the sender has the private key.
Digital signature
Used to prevent someone from denying they took an action. Audit logs record details of who, what, where, and when on events. If an audit log records an action by a suer after the user logs on, the user cannot believably deny the action. Digital signatures are also used for ___.
Non-repudiation
A class of control identified by its function. It will attempt to prevent the risk from occurring. For example, an unneeded protocol is removed from a server to harden it. Any attacks on this protocol are now prevented on this server.
Preventative control
A document users must read before accessing a system. It identifies what they can and cannot do on the system. It is also called an acceptable use policy (AUP) in most private organizations.
Rules of Behavior
A tool used to capture traffic on a network in order to analyze it. Wireshark is a packet analyzer that can be used as a ___. If data is sent in clear text, the captured traffic can easily be read.
Sniffer
- A ___ will reduce or eliminate a threat or vulnerability.
Control or countermeasure
- Controls can be identified based on their function. The functions are preventative, detective, and corrective.
TRUE OR FALSE
TRUE
- What are the primary objectives of a control?
- Prevent, control, attack
- Prevent, respond, log
- Prevent, recover, detect
- Detect, recover, attack
Prevent, recover, detect
- What type of control is an intrusion detection system (IDS)?
- Preventative
- Detective
- Corrective
- Recovery
Detective
- NIST SP 800-53 identifies controls in three primary classes. What are they?
- Preventative, Detective, Corrective
- Administrative, Technical, Operational
- Technical, Administrative, Environmental
- Technical, Operational, Management
Technical, Operational, Management