Module 5: Security Flashcards

1
Q

Security

A

the practice of controlling access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accessibility

A

how easy it is for users to use a resource - must be balanced with security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

ensuring information is only available to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

ensuring that data is not modified by unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

ensuring the data is accessible to users who need it when they need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Snooping

A

any attempt to get access to information that you are not authorized to view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Eavesdropping/Wiretapping

A

snooping on data as it is transmitted over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering

A

getting users to reveal information in order to gain access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dumpster Diving

A

going through an organization’s garbage in order to get helpful information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Man-in-the-Middle Attack

A

when someone on the network intercepts, captures, and relays communications between two unsuspecting individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replay Attack

A

when a host captures another host’s response to a server and replays that response to gain unauthorized access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Impersonation Attack

A

an attack in which a user can masquerade as an authorized user in order to gain access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of Service Attack

A

any attack in which an attacker targets the availability of a service (as in a DDoS attack).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access Controls

A

a system that prevents unauthorized access of a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentication

A

proving that a user is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authorization

A

ensuring that only specific users have access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Accounting

A

recording when and by whom a resource was accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identity Fraud

A

compromising someone’s account or masquerading as another user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Shoulder Surfing

A

stealing a password or other secure information by watching the person type it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fault Tolerance

A

building extra components into a system to ensure the system can continue operating in the event of component failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Contingency Plan

A

backup plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Redundancy

A

having more than one of a thing to protect against failure (for example: data is mirrored on two identical hard drives in case one fails).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RAID 1

A

An array of hard drives in which data is written to both drives, so that they each contain identical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
RAID 5
An array of hard drives in which three disks are combined into a single logical drive. Data is written across all disks in such a way that it can be recovered if one disk fails.
26
UPS
Uninterruptible Power Supply - provides emergency power to a system in case of power outage; consists of a battery, capacitors, or other energy storage device.
27
Program Virus
sequences of malicious code that insert themselves into another program
28
Macro Virus
malicious code that is embedded in Microsoft Office documents
29
Worm
a virus that can spread using network resources without human intervention (the user doesn't need to start a program, etc.)
30
Payload
the part of the virus that does damage - can be performed to vandalize, corrupt files, or install other malware
31
Email Spoofing
Some malware can appear as though it is being sent from one of your contacts by spoofing its sent-from address
32
Application Exploits
security vulnerabilities that exist in software applications
33
Drive-by Download
when malware is embedded into a website, the user only needs to visit the site to become infected
34
Trojan
a type of malware that pretends to be a useful program in order to get the user to install it
35
Rogueware/Scareware
a type of malware that masquerades as an antivirus program in order to trick users into installing it
36
Backdoor
a method of accessing and controlling a PC remotely
37
Ransomware
malware that encrypts a user's documents/files and demands payment in order to provide the means to decrypt the files
38
Security Update
fixes for security vulnerabilities that are released by program vendors
39
Patch
a fix for an application that is released by the application vendor
40
Vector
the means by which a computer is infected by malware (downloading programs, visiting infected sites, etc.)
41
Antivirus Signatures/Definitions
patterns that antivirus programs use to detect and remove infections
42
Heuristic Identification
detecting viruses based on their behavior, rather than the actual code itself
43
On-Access Scanning
scanning a file for malware whenever it is accessed by the system
44
Quarantine
when an infected file is prevented from being accessed
45
Device Hardening
the act of making a device more secure
46
Bloatware/Crapware
software that is pre-installed on new PCs - usually demos of paid software
47
Spam
unsolicited e-mail messages, frequently used to spread malware infections or launch phishing attacks
48
Phishing
a technique for tricking a user into revealing information by requesting it in an official-looking e-mail or website.
49
Pharming
an attempt to redirect traffic to a counterfeit page in order to get users' personal information
50
Service Pack
a collection of updates that may also contain new features or functionality
51
Windows Update
the website and built-in application that Windows uses to keep itself up-to-date
52
Quality Updates
security and critical updates - these should normally be installed immediately
53
Feature Updates
updates that introduce new functionality
54
Access Control List
a list of users and their rights or permissions on the system
55
Principle of Least Privilege
the idea that users should only have the permissions necessary to do their jobs, and no more
56
Implicit Deny
unless there is a rule specifying that access should be granted, it is denied by default
57
Discretionary Access Control
a system in which a file's creator has full control over it and can decide what permissions other users have
58
Role-Based Access Control
a system in which users are given a role (standard user, administrator, power user, etc.) and their access to resources is based on their role
59
Mandatory Access Control
a system based on the idea of clearance levels
60
Rule-Based Access Control
any system that controls access to resources based on a set of rules (such as Role-Based and Mandatory Access Control systems).
61
Non-Repudiation
the principle that the user cannot deny having performed an action
62
Windows Default Accounts
Administrator, standard, and guest
63
Administrator Account
A default Windows account that has full control over the entire PC. Disabled by default.
64
Guest Account
An account that can be used with no authentication. This is disabled by default and should remain disabled.
65
Group Accounts
Users are assigned to specific groups (administrators, standard users, etc.) and get their security permissions based on their group assignment(s)
66
Authentication Factors
Something you know (password, etc.) Something you have (your phone, etc.) Something you are (fingerprint, etc.) Somewhere you are (GPS based location)
67
Hardware Token
a device or item, such as a USB drive or smart card, that can act as an authentication factor
68
Multifactor Authentication
using more than one type of authentication (from more than one group). An example would be "something you know" (password), along with "something you have" (your phone).
69
Single Sign-On
A system that allows users to authenticate to multiple systems at once by using one sign-on (Google, for instance)
70
Cipher Text
an encrypted document
71
Encryption Key
a piece of information used to encrypt and decrypt data.
72
Private Key
in private key cryptography, a private key is used to decrypt data
73
Public Key
in private key cryptography, a public key is used to encrypt data
74
PKI
Public Key Infrastructure
75
Cryptographic Hash
a representation of data
76
Cryptographic Hash
a method of keeping passwords and other information secret by using a mathematical function
77
Data at Rest
data as it is stored on a permanent disk (hard drive, etc.)
78
Data in Transit
data as it is being transmitted over a network
79
Virtual Private Network
a method of providing secure communication across public networks (like the Internet)
80
Cleartext
text (or other data) that has not been encrypted
81
Dictionary Attack
a password attack in which an attacker will use a collection of known passwords to try to guess a password
82
Brute Force Attack
a password attack in which an attacker will try every possible combination of characters
83
Password Best Practices
Length: should be 9-12 characters for normal accounts or more than 14 for administrator accounts; Complexity: avoid single words or obvious phrases; use a mixture of upper and lower case Memorability: should be able to remember it Do not write it down Change password periodically Do not reuse passwords across different sites
84
Acceptable Use Policy
defines what a person can and cannot do with a particular service or resource
85
Security Assurance
monitoring employee communications to ensure they do not reveal confidential information or compromise security
86
Monitoring Data
analyzing data communications to measure an employee's productivity
87
Physical Monitoring
recording employees' movement, location, and behavior within the workplace