Lecture 1 Flashcards

Information Security Concepts

1
Q

What is Database Security?

A

Principles, tools, and policies that protect against database attacks and misuse of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List 3 Common database security features:

A
  • Access Control
  • Authentication
  • Data Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give an example of Confidentiality, Integrity, and Availability in database security:

A

Confidentiality: Encrypting stored data.

Integrity: Implementing hashing algorithms to detect unauthorized changes do the data.

Availability: Using a distributed database system with multiple servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a “social engineer”?

A

A person who manipulates other people to gain access to systems or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name and explain the 4 phases in the Security Architecture Cycle

A

1- Assessment & Analysis: listing and evaluating organizational assets and risks via auditing.

2- Design & Modeling: Creating policies and planning for changes to fit business needs.

3- Deployment: Testing then Implementing the security plan.

4- Management and Support: Monitoring performance and reevaluating in case of security failure or negative feedback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 risk assessment steps?

A

1- List all devices
2- Identify vulnerablities and assets within each device
3- Valuate assets and cost of damage from threats
4- Create security measures mitigate the threats
5- Prioritize the security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 design steps?

A

1- Define needed policies and procedures
2- Identify software changes to support the policies
3- Create the deployment plan
4- Create baselines to determine success and failure
5- Create a plan for user awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 Deployment steps?

A

1- Adjust user training as needed

2- Test software changes in a simulated controlled environment

3- Deploy the changes according to the plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 Management and Support steps?

A

1- Monitor performance

2- Review policies as necessary

3- Identify the need for a reassessment and initiate the start of the security life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain “The disaster plan”:

A

The plan to quickly respond and recover from a human-caused or natural disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List and explain the 3 Physical site recovery options:

A

Cold Site: basic necessities to rebuild a network.

Warm Site: basic necessities with software and hardware.

Hot Site: exact replica of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly