Module 5: Security Flashcards
Security
the practice of controlling access to a resource
Accessibility
how easy it is for users to use a resource - must be balanced with security
CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
ensuring information is only available to authorized users
Integrity
ensuring that data is not modified by unauthorized users
Availability
ensuring the data is accessible to users who need it when they need it
Snooping
any attempt to get access to information that you are not authorized to view
Eavesdropping/Wiretapping
snooping on data as it is transmitted over a network
Social Engineering
getting users to reveal information in order to gain access to a network
Dumpster Diving
going through an organization’s garbage in order to get helpful information
Man-in-the-Middle Attack
when someone on the network intercepts, captures, and relays communications between two unsuspecting individuals
Replay Attack
when a host captures another host’s response to a server and replays that response to gain unauthorized access to a system
Impersonation Attack
an attack in which a user can masquerade as an authorized user in order to gain access to a system
Denial of Service Attack
any attack in which an attacker targets the availability of a service (as in a DDoS attack).
Access Controls
a system that prevents unauthorized access of a resource
Authentication
proving that a user is who they say they are
Authorization
ensuring that only specific users have access to a resource
Accounting
recording when and by whom a resource was accessed
Identity Fraud
compromising someone’s account or masquerading as another user
Shoulder Surfing
stealing a password or other secure information by watching the person type it
Fault Tolerance
building extra components into a system to ensure the system can continue operating in the event of component failure
Contingency Plan
backup plan
Redundancy
having more than one of a thing to protect against failure (for example: data is mirrored on two identical hard drives in case one fails).
RAID 1
An array of hard drives in which data is written to both drives, so that they each contain identical information.
RAID 5
An array of hard drives in which three disks are combined into a single logical drive. Data is written across all disks in such a way that it can be recovered if one disk fails.
UPS
Uninterruptible Power Supply - provides emergency power to a system in case of power outage; consists of a battery, capacitors, or other energy storage device.
Program Virus
sequences of malicious code that insert themselves into another program
Macro Virus
malicious code that is embedded in Microsoft Office documents
Worm
a virus that can spread using network resources without human intervention (the user doesn’t need to start a program, etc.)
Payload
the part of the virus that does damage - can be performed to vandalize, corrupt files, or install other malware
Email Spoofing
Some malware can appear as though it is being sent from one of your contacts by spoofing its sent-from address
Application Exploits
security vulnerabilities that exist in software applications
Drive-by Download
when malware is embedded into a website, the user only needs to visit the site to become infected
Trojan
a type of malware that pretends to be a useful program in order to get the user to install it