Modules 1 & 2 Flashcards
What is the CIA triad?
Confidentiality
Integrity
Availability
What is the difference between policy and mechanism?
- Policy says what is, and is not, allowed. This defines “security” for the system.
- Mechanisms enforce policies through technical or procedural means.
What characterizes an Advanced Persistent Threat (APT)?
Organized Directed Well financed Patient Silent
What are four (4) common types of harm?
Interception, Interruption, Modification, Fabrication
What are the three classes of controls?
- Physical controls stop or block an attack by using something tangible too, such as walls and fences
- Procedural or administrative controls use a command or agreement that
- Technical controls counter threats with technology (hardware or software)
What are the three classes of authentication strategies?
- something you know
- something you have
- something you are
What are common attacks on “something you know”?
Dictionary attacks Inferring likely passwords/answers Guessing Defeating concealment Exhaustive or brute-force attack Rainbow tables
What is a rainbow table?
Rainbow Tables are datasets of chains of pre-generated “hash-values” for almost every popular password variant, thus reducing the difficulty of password cracking.
What are the goals of an access policy?
-Check every access
-Enforce least privilege
-Verify acceptable usage
(Access control ensures the prevention of unauthorized use of a resource, including the use of a resource in an unauthorized way.)
What is a potential vulnerability of a static authentication token, and what is an alternative?
Skimming attacks. Alternative is dynamic (time-based) authentication token.
What is Federated Identity Manager (FIM)?
A system that assists in managing identities and providing access to resources across different security domains and/or companies.
What is single sign-on (SSO)?
An authentication process that allows a user to access multiple applications with one set of login credentials.
What is an Access Control security policy?
Defines which users can access resources and with which rights (Who, what, how : Subject, object, attribute right).
For access control, what are “Subjects”?
- An entity trying to access a resource
- users, processes
For access control, what are “Objects”?
- things on which an action can be performed:
- Files, tables, programs, memory objects, hardware devices, strings, data fields, network connections, and processors are examples of objects