Lesson 1 Flashcards
For a network intrusion to occur all three legs of the intrusion triangle must exist. These are:
Motive
Means
Opportunity
_______refers to the characteristic of a communication or any data that ensures the quality of being genuine or not corrupted from the original
Authenticity
Major roles of ___________ include confirming that the user is who he or she claims to be and ensuring the message is authentic and not altered or forged
authentication
___ ___ ___
are used to ensure authenticity of data, transactions, communications or documents.
Biometrics , smart cards , or digital certificates
refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated
•
It It is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message
Non-repudiation
_____ and ___ are used to establish authenticity and non-repudiation of a document or message.
Digital signatures
and
encryption
Information security deals principally with _________
.
risk management
Once the enterprise’s assets and their corresponding threats have been identified, risk management can take the form of: (4)
– Acceptance – Mitigation – Transference – Avoidance
________ (IC3)
is a resource for both victims of Internet crime and the law enforcement agencies investigating and prosecuting these crimes.
The Internet Crime Complaint Center
The level of security in any system can be defined by the strength of three components:
Functionality (Features)
Security (Restrictions)
Usability
Types of Attacks on a System
Operating system attacks < Misconfiguration attacks < Shrink wrap code attacks < Application level attacks <
Some of the OS vulnerabilities:
– Buffer overflow vulnerabilities – Bugs in operating system – Unpatched operating system
This will lead to default code or shrink wrap code attacks.
not fine tuning or customizing OS/Application scripts
_______________ is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide
A security policy
Keep in mind that in the end the basic goals for IT security for an organization can be stated as:
Maintain the organization’s competitive advantage
–
Protect the organization’s reputation
–
Comply with mandates by governmental regulations.