Module 5: Security Flashcards

1
Q

Security

A

the practice of controlling access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accessibility

A

how easy it is for users to use a resource - must be balanced with security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

ensuring information is only available to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

ensuring that data is not modified by unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

ensuring the data is accessible to users who need it when they need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Snooping

A

any attempt to get access to information that you are not authorized to view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Eavesdropping/Wiretapping

A

snooping on data as it is transmitted over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering

A

getting users to reveal information in order to gain access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dumpster Diving

A

going through an organization’s garbage in order to get helpful information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Man-in-the-Middle Attack

A

when someone on the network intercepts, captures, and relays communications between two unsuspecting individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replay Attack

A

when a host captures another host’s response to a server and replays that response to gain unauthorized access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Impersonation Attack

A

an attack in which a user can masquerade as an authorized user in order to gain access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of Service Attack

A

any attack in which an attacker targets the availability of a service (as in a DDoS attack).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access Controls

A

a system that prevents unauthorized access of a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentication

A

proving that a user is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authorization

A

ensuring that only specific users have access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Accounting

A

recording when and by whom a resource was accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identity Fraud

A

compromising someone’s account or masquerading as another user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Shoulder Surfing

A

stealing a password or other secure information by watching the person type it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fault Tolerance

A

building extra components into a system to ensure the system can continue operating in the event of component failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Contingency Plan

A

backup plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Redundancy

A

having more than one of a thing to protect against failure (for example: data is mirrored on two identical hard drives in case one fails).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RAID 1

A

An array of hard drives in which data is written to both drives, so that they each contain identical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RAID 5

A

An array of hard drives in which three disks are combined into a single logical drive. Data is written across all disks in such a way that it can be recovered if one disk fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

UPS

A

Uninterruptible Power Supply - provides emergency power to a system in case of power outage; consists of a battery, capacitors, or other energy storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Program Virus

A

sequences of malicious code that insert themselves into another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Macro Virus

A

malicious code that is embedded in Microsoft Office documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Worm

A

a virus that can spread using network resources without human intervention (the user doesn’t need to start a program, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Payload

A

the part of the virus that does damage - can be performed to vandalize, corrupt files, or install other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Email Spoofing

A

Some malware can appear as though it is being sent from one of your contacts by spoofing its sent-from address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Application Exploits

A

security vulnerabilities that exist in software applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Drive-by Download

A

when malware is embedded into a website, the user only needs to visit the site to become infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Trojan

A

a type of malware that pretends to be a useful program in order to get the user to install it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Rogueware/Scareware

A

a type of malware that masquerades as an antivirus program in order to trick users into installing it

36
Q

Backdoor

A

a method of accessing and controlling a PC remotely

37
Q

Ransomware

A

malware that encrypts a user’s documents/files and demands payment in order to provide the means to decrypt the files

38
Q

Security Update

A

fixes for security vulnerabilities that are released by program vendors

39
Q

Patch

A

a fix for an application that is released by the application vendor

40
Q

Vector

A

the means by which a computer is infected by malware (downloading programs, visiting infected sites, etc.)

41
Q

Antivirus Signatures/Definitions

A

patterns that antivirus programs use to detect and remove infections

42
Q

Heuristic Identification

A

detecting viruses based on their behavior, rather than the actual code itself

43
Q

On-Access Scanning

A

scanning a file for malware whenever it is accessed by the system

44
Q

Quarantine

A

when an infected file is prevented from being accessed

45
Q

Device Hardening

A

the act of making a device more secure

46
Q

Bloatware/Crapware

A

software that is pre-installed on new PCs - usually demos of paid software

47
Q

Spam

A

unsolicited e-mail messages, frequently used to spread malware infections or launch phishing attacks

48
Q

Phishing

A

a technique for tricking a user into revealing information by requesting it in an official-looking e-mail or website.

49
Q

Pharming

A

an attempt to redirect traffic to a counterfeit page in order to get users’ personal information

50
Q

Service Pack

A

a collection of updates that may also contain new features or functionality

51
Q

Windows Update

A

the website and built-in application that Windows uses to keep itself up-to-date

52
Q

Quality Updates

A

security and critical updates - these should normally be installed immediately

53
Q

Feature Updates

A

updates that introduce new functionality

54
Q

Access Control List

A

a list of users and their rights or permissions on the system

55
Q

Principle of Least Privilege

A

the idea that users should only have the permissions necessary to do their jobs, and no more

56
Q

Implicit Deny

A

unless there is a rule specifying that access should be granted, it is denied by default

57
Q

Discretionary Access Control

A

a system in which a file’s creator has full control over it and can decide what permissions other users have

58
Q

Role-Based Access Control

A

a system in which users are given a role (standard user, administrator, power user, etc.) and their access to resources is based on their role

59
Q

Mandatory Access Control

A

a system based on the idea of clearance levels

60
Q

Rule-Based Access Control

A

any system that controls access to resources based on a set of rules (such as Role-Based and Mandatory Access Control systems).

61
Q

Non-Repudiation

A

the principle that the user cannot deny having performed an action

62
Q

Windows Default Accounts

A

Administrator, standard, and guest

63
Q

Administrator Account

A

A default Windows account that has full control over the entire PC. Disabled by default.

64
Q

Guest Account

A

An account that can be used with no authentication. This is disabled by default and should remain disabled.

65
Q

Group Accounts

A

Users are assigned to specific groups (administrators, standard users, etc.) and get their security permissions based on their group assignment(s)

66
Q

Authentication Factors

A

Something you know (password, etc.)
Something you have (your phone, etc.)
Something you are (fingerprint, etc.)
Somewhere you are (GPS based location)

67
Q

Hardware Token

A

a device or item, such as a USB drive or smart card, that can act as an authentication factor

68
Q

Multifactor Authentication

A

using more than one type of authentication (from more than one group). An example would be “something you know” (password), along with “something you have” (your phone).

69
Q

Single Sign-On

A

A system that allows users to authenticate to multiple systems at once by using one sign-on (Google, for instance)

70
Q

Cipher Text

A

an encrypted document

71
Q

Encryption Key

A

a piece of information used to encrypt and decrypt data.

72
Q

Private Key

A

in private key cryptography, a private key is used to decrypt data

73
Q

Public Key

A

in private key cryptography, a public key is used to encrypt data

74
Q

PKI

A

Public Key Infrastructure

75
Q

Cryptographic Hash

A

a representation of data

76
Q

Cryptographic Hash

A

a method of keeping passwords and other information secret by using a mathematical function

77
Q

Data at Rest

A

data as it is stored on a permanent disk (hard drive, etc.)

78
Q

Data in Transit

A

data as it is being transmitted over a network

79
Q

Virtual Private Network

A

a method of providing secure communication across public networks (like the Internet)

80
Q

Cleartext

A

text (or other data) that has not been encrypted

81
Q

Dictionary Attack

A

a password attack in which an attacker will use a collection of known passwords to try to guess a password

82
Q

Brute Force Attack

A

a password attack in which an attacker will try every possible combination of characters

83
Q

Password Best Practices

A

Length: should be 9-12 characters for normal accounts or more than 14 for administrator accounts;
Complexity: avoid single words or obvious phrases; use a mixture of upper and lower case
Memorability: should be able to remember it
Do not write it down
Change password periodically
Do not reuse passwords across different sites

84
Q

Acceptable Use Policy

A

defines what a person can and cannot do with a particular service or resource

85
Q

Security Assurance

A

monitoring employee communications to ensure they do not reveal confidential information or compromise security

86
Q

Monitoring Data

A

analyzing data communications to measure an employee’s productivity

87
Q

Physical Monitoring

A

recording employees’ movement, location, and behavior within the workplace