Module 5: Security Flashcards
Security
the practice of controlling access to a resource
Accessibility
how easy it is for users to use a resource - must be balanced with security
CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
ensuring information is only available to authorized users
Integrity
ensuring that data is not modified by unauthorized users
Availability
ensuring the data is accessible to users who need it when they need it
Snooping
any attempt to get access to information that you are not authorized to view
Eavesdropping/Wiretapping
snooping on data as it is transmitted over a network
Social Engineering
getting users to reveal information in order to gain access to a network
Dumpster Diving
going through an organization’s garbage in order to get helpful information
Man-in-the-Middle Attack
when someone on the network intercepts, captures, and relays communications between two unsuspecting individuals
Replay Attack
when a host captures another host’s response to a server and replays that response to gain unauthorized access to a system
Impersonation Attack
an attack in which a user can masquerade as an authorized user in order to gain access to a system
Denial of Service Attack
any attack in which an attacker targets the availability of a service (as in a DDoS attack).
Access Controls
a system that prevents unauthorized access of a resource
Authentication
proving that a user is who they say they are
Authorization
ensuring that only specific users have access to a resource
Accounting
recording when and by whom a resource was accessed
Identity Fraud
compromising someone’s account or masquerading as another user
Shoulder Surfing
stealing a password or other secure information by watching the person type it
Fault Tolerance
building extra components into a system to ensure the system can continue operating in the event of component failure
Contingency Plan
backup plan
Redundancy
having more than one of a thing to protect against failure (for example: data is mirrored on two identical hard drives in case one fails).
RAID 1
An array of hard drives in which data is written to both drives, so that they each contain identical information.