Module 11: Storage Infrastructure Security (Introduction to Information Security + Key Security Threats) Flashcards

1
Q

What are the goals of information security?

A

confidentiality
integrity
availability
accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Governance, Risk and Compliance (GRC)?

A

term encompassing processes that help an organization to ensure that their acts are ethically correct and in accordance with internal/external policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is governance?

A

determines the purpose and strategy by which companies are directed/managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is risk management?

A

systematic process of assessing assets and creating risk profile for information around the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is compliance?

A

act of adhering to and demonstrating adherence to external laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the key approaches for GRC teams to reach their CIAA goals?

A

authentication
authorization
auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authentication?

A

process to ensure that users or assets are who they claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is single factor authentication?

A

involves the use of only one factor such as a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is multi factor authentication?

A

uses more than one factor to authenticate user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is authorization?

A

process of determining whether and in which manager someone is allowed to access a particular service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is auditing?

A

refers to the logging of all transactions for the purpose of assessing the effectiveness of security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 storage security domains?

A

application access
management access
backup/replication/archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the application access domain?

A

may include only those apps that access the data through the file system or database interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the management access domain?

A

includes management access to storage and interconnecting devices and to the data residing on the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the backup access domain?

A

primarily accessed by storage admins who configure and manage the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is denial of service?

A

prevents legitimate users from accessing resources or services

17
Q

What is a malicious insider?

A

orgs current or former employee who has had authorized access to an organizations data center

18
Q

What is a man in the middle attack?

A

another way to hack user’s credentials - attacker eavesdropes on the network channel between two sites

19
Q

What is IPSec?

A

suite of algorithms/procedures for securing IP communications by authenticating/encrypting packets

20
Q

What is account hijacking?

A

scenario where an attacker gains access to an admins account

21
Q

What is phishing?

A

social engineering attack that is used to deceive devices

22
Q

What does the hacker use in a account hijacking attack?

A

keystroke logging malware

23
Q

What is a fileless attack?

A

low observable characteristics (LOC) attacks that avoid detection by most security solutions

24
Q

How do fileless attacks work?

A

not based on new files and don’t install new software on target machine

goes straight to memory never touches the hard drive