Module 5 - Security Concerns Flashcards

1
Q

What are the three properties of secure information?

A

Confidentiality, Integrity, and Availability (the CIA Triad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security?

A

The practice of controlling access to something (a resource)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List three confidentiality concerns in the context of security.

A
  1. Snooping
  2. Eavesdropping/Wiretapping
  3. Social engineering/Dumpster Diving
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If someone attempts to get access to information or a host or storage device (data at rest) that they are not authorized to view (e.g., by stealing password, using an unlocked workstation, or installing spyware), breaking confidentiality, what is this called?

A

Snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is it called when someone snoops on data or telephone conversations as they pass over the network? Also what is another name for it?

A

Eavesdropping/wiretapping. Also called sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can networks protect data in transit from eavesdropping/wiretapping (sniffing)?

A

Segmentation and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is it called when someone gets users to reveal secure information or finds vulnerable printed information, sometimes posing as IT professionals or technical support?

A

Social engineering/dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some passive threats to security?

A

Copying data to an unsecure storage location or attaching the wrong file to an email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are three types of integrity attacks that threaten security?

A
  1. Man in the Middle
  2. Replay
  3. Impersonation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the security concern dealing with information being known only to authorized users?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the security concern that protects information being stored and transferred as intended and not being modified without authorization?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the security concern that ensures that information is accessible to those authorized to view or modify it?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when a host sits between two communicating notes and transparently monitors, captures, and relays all communication between them? The attacker may change messages between a sender and receiver without the team’s knowledge.

A

Man-in-the-Middle (MitM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What policies/processes can be used to protect against an MitM attack?

A

Authentication of users and encryption to validate messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a host captures another host’s response to some server and replays that response to gain authorized access, what is it called? This may involve exploiting an access token generated by software.

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can an encryption protect against replay?

A

With encryption and timestamping so that tokens cannot be misused

17
Q

What is a common attack where someone attempts to figure out a password or other credentials to gain access to a host through, for example, interception of password packets or brute force?

A

Impersonation

18
Q

What are some threats against availability from a security standpoint?

A
  1. Accidents
  2. Oversights
  3. Denial of Service (DoS)/Distributed Denial of Service (DDoS)
  4. Power Outage
  5. Hardware Failure
  6. Destruction
  7. Service Outage