Lesson 1 Flashcards

1
Q

This is the study of how to protect your information assets from destruction, degradation, manipulation, and exploitation. But also how to recover should any of those happen

A

Information Assurance (AI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five aspects of information needed protection

A
  • Availability
  • Integrity
  • Confidentiality
  • Authentication
  • Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This talks about timely, reliable access to data and information services and authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This talks about protection against unauthorized modification or destruction of information

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This talks about assurance that information is not disclosed to unauthorized persons

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This talks about security measures to establish the validity of a transmission, message, or originator

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This talks about the assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender’s identity, so that neither can later deny having processed the data.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False:
IT security cannot be accomplished in a vacuum, because there are a multitude of dependencies and interactions among all four security engineering domains.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four major categories of Information Assurance?

A
  • Physical Security
  • Personnel Security
  • IT Security
  • Operational Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the proper practice of Information Assurance?

A
  1. Enforcing hard-to-guess passwords
  2. Encrypting hard drives
  3. Locking sensitive documents in a safe
  4. Assigning security clearances to staffers
  5. Using SSL for data transfers
  6. Having off-site backup of documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This refers to the protection of hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services and loss of assets.

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a variety of ongoing measures taken to reduce the likelihood and severity of accidental and intentional alteration, destruction, misappropriation, misuse, misconfiguration, unauthorized distribution, and unavailability of an organization’s logical and physical assets, as the result of action or inaction by insiders and known outsiders, such as business partners.

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is the inherent technical features and functions that collectively contribute to an IT infrastructure achieving and sustaining confidentiality, integrity, availability, accountability, authenticity, and realiability

A

IT Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This involves the implementation of standard operational security procedures that define the nature and frequency of the interaction between users, systems, and system resources.

A

Operational Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the purpose of operational security?

A
  1. Achieve and sustain a known secure system state at all time
  2. Prevent accidental or intentional theft, release, destruction, alteration, misuse, or sabotage of system resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

According to this, a computing environment is made up of five continuously interacting components. And information assurance includes computer and information security.

A

Raggad’s Taxonomy of Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the five continuously interacting components when it comes to a computing environment?

A
  1. Activities
  2. People
  3. Data
  4. Technology
  5. Networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

According to them, information assurance can be thought of as protecting information at three distinct levels.

A

Blyth and Kovacich

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three distinct levels when it comes information assurance as protecting information?

A
  1. Physical
  2. Information Infrastructure
  3. Perceptual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This talks about data and data processing activities in physical space.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This talks about information and data manipulation abilities in cyberspace.

A

Information Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This talks about knowledge and understanding in human decision space.

A

Perceptual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the lowest level focus of Information Assurance

A

Physical Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This talks about computers, physical network, telecommunications and supporting systems such as power, facilities and environmental controls. Also at this level are the people who manage the systems.

A

Physical Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the desired effect in physical level?

A

This is to affect the technical performance and the capability of physical systems, to disrupt the capabilities of the defender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the attacker’s operations in physical level?

A

This talks about physical attack and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the examples of Attacker’s Operations in Physical level?

A
  1. Electromagnetic Attack
  2. Visual Spying
  3. Intrusion
  4. Scavenging and Removal
  5. Wiretapping
  6. Interference
  7. Eavesdropping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the Defender’s operation in physical level?

A

This talks about physical security, operations security, and telecommunications electronics materials protected from emanating spurious transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the information assurance aspects when it comes to the defenders operation in physical level.

A
  1. COMPSEC
  2. COMSEC
  3. ITSEC
  4. OPSEC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Meaning of COMPSEC

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Meaning of COMSEC

A

Communication and Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Meaning of ITSEC

A

The Information Technology Security Evaluation Criteria
(which includes both COMPSEC and COMSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Meaning of OPSEC

A

Operations Security

34
Q

What is the second level focus of Information Assurance?

A

Information Infrastructure Level

35
Q

This covers information and data manipulation ability maintained in cyberspace

A

Information Infrastructure Level

36
Q

What are the things included in Information Infrastructure Level?

A
  1. Data Structures
  2. Processes and Programs
  3. Protocols
  4. Data Content and Databases
37
Q

What is the desired effects in Information Infrastructure Level?

A

To influence the effectiveness and performance of information functions supporting perception, decision making, and control of physical processes.

38
Q

What is the Attackers Operation in Information Infrastructure level?

A
  1. Impersonation
  2. Piggybacking
  3. Spoofing
  4. Network Attacks
  5. Malware
  6. Authorization Attacks
  7. Active Misuse
  8. Denial of Service Attack
39
Q

What is the Defender’s Operations in Information Infrastructure level?

A
  1. Encryption and Key Management
  2. Intrusion Detection
  3. Anti-virus Software
  4. Auditing
  5. Redundancy
  6. Firewalls
  7. Policies and Standards
40
Q

What is the third level focus of Information Assurance

A

Perceptual Level or Social Engineering

41
Q

This is abstract and concerned with the management of perceptions of the target, particularly those persons making security decisions

A

Perceptual Level

42
Q

What is the desired effects in perceptual level

A

To Influence decisions and behavior

43
Q

What is the Attacker’s Operations in Perceptual Level?

A

Psychological Operations:
1. Deceptions
2. Blackmail
3. Bribery and Corruption
4. Social Engineering
5. Trademark and Copyright Infringement
6. Defamation
7. Diplomacy
8. Creating Distrust

44
Q

What is the Defender’s Operations in Perceptual Level?

A

Personnel Security:
1. Psychological Testing
2. Education
3. Screening (Biometrics, Watermarks, Keys, and PasswordsA)

45
Q

This is the flip side of information assurance and this think as the offensive part.

A

Information Warfare

46
Q

This involves managing an opponent’s perception through deception and psychological operations. In military circles, this is called Truth Projection

A

Type I

47
Q

This involves denying, destroying, degrading, or distorting the opponent’s information flows to disrupts their ability to carry out or coordinate operations

A

Type II

48
Q

This gathers intelligence by exploiting the opponent’s use of information systems

A

Type III

49
Q

What are the offensive players in the world of Information Warfare

A
  1. Insiders
  2. Hackers
  3. Criminals
  4. Corporations
  5. Governments and Agencies
  6. Terrorists
50
Q

These consists of employees, former employees, and contractors

A

Insiders

51
Q

These are the one who gains unauthorized access to or breaks into information systems for thrills, challenge, power, or profit

A

Hackers

52
Q

These are target information that may be of value to them: bank accounts, credit card information, intellectual property

A

Criminals

53
Q

These are actively seek intelligence about competitors or steal trade secrets

A

Corporations

54
Q

These seek the military, diplomatic, and economic secrets of foreign governments, foreign corporations, and adversaries. May also target domestic adversaries

A

Governments

55
Q

These usually politically motivated and may seek to cause maximal damage to information infrastructure as well as endanger lives and property

A

Terrorists

56
Q

True or False:
Information Assurance is both Proactive and Reactive

A

True

57
Q

Since Information Assurance is both Proactive and Reactive, what does it involves?

A

Protection
Detection
Capability Restoration
Response

58
Q

What are the IA environmental protection pillars

A

Ensure the Availability
Integrity
Authenticity
Confidentiality
Non-repudiation of Information

59
Q

This talks about the timely attack detection and reporting is key to initiating the restoration and response processes

A

Attack Detection

60
Q

These relies on established procedures and mechanisms for prioritizing restoration of essential functions.

A

Capability Restoration

61
Q

This may rely on backup or redundant links, information system components, or alternative means of information transfer

A

Capability Restoration

62
Q

This is the resource being protected

A

Asset

63
Q

What are the types of Assets?

A

Physical Assets
Logical Assets
System Assets

64
Q

What are the examples of Physical Assets

A

Devices
Computers
People

65
Q

What are the examples of Logical Assets?

A

Information
Data in Transmission
Data in Storage
Data in Processing
Intellectual Property

66
Q

What are the examples of System Assets

A

Software
Hardware
Data
Administrative
Physical
Communications
Personal Resource within an information system

67
Q

These have value so are worth protecting

A

Assets

68
Q

Often a security solution/policy is phrased in terms of the following three categories, what are those three categories?

A

Objects
Subjects
Actions

69
Q

These are the items being protected by the system

A

Objects

70
Q

Example of Objects

A

Documents
Files
Directories
Databases
Transactions

71
Q

These are entities that execute activities and request access to objects

A

Subjects

72
Q

Example of Subjects

A

Users
Processes

73
Q

These are operations, primitive, or complex, that can operate on objects and must be controlled.

A

Actions

74
Q

What are the critical aspects that information assets may have?

A
  1. Availability
  2. Accuracy
  3. Authenticity
  4. Confidentiality
  5. Integrity
  6. Utility
  7. Possession
75
Q

These authorized users are able to access it

A

Availability

76
Q

This talks about the information is free of error and has the value expected

A

Accuracy

77
Q

This talks about the information is genuine

A

Authenticity

78
Q

This information has not been disclosed to unauthorized parties

A

Confidentiality

79
Q

This information is whole, complete, uncorrupted

A

Integrity

80
Q

This information has value for the intended purpose

A

Utility

81
Q

This data is under authorized ownership and control

A

Possession