Modules 1 + 2 Term -> Def Flashcards

1
Q

CIA Triad

A

A model for guiding security policies in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Ensuring that data is only accessible to authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Maintaining accuracy and consistency of data over its lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Ensuring that authorized users have reliable access to data and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA

A

Authentication, Authorization, and Accounting framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identification

A

Claiming an identity in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication

A

Proving identity using credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authorization

A

Granting access to resources based on identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accounting

A

Tracking actions and accesses in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 States of Data

A

Three conditionsff under which data exists. : at rest, in transit, in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Transit

A

Data that is being transmitted across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At Rest

A

Data stored in a persistent storage medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Use

A

Data actively used by a process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Non-Repudiation

A

Ensuring that a sender cannot deny having sent a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gap Analysis

A

Comparison of security measures against requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability

A

A weakness in a system or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threat

A

A vulnerability with a threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk

A

The probability and impact of a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Sovereignty

A

Compliance with local data storage regulations. the country of the user about whom the data is stored governs that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Security Controls

A

Methods for managing security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Categories of Security (STOMP)

A

Security control classifications.

Security is:

Technical
Operational
Managerial
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Deterrent

A

Discouraging unauthorized actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Preventative

A

Preventing security incidents.

(eg lock on product case)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Detective

A

Detecting security breaches.

25
Q

Corrective

A

Restoring system integrity after an attack.

26
Q

Compensating

A

Back up for another security control or weakness. For example, password strength requirements and two factor authentication.

27
Q

Directive

A

Enforces a rule or behavior, specifying how people should interact with a system

For example, policies, and disciplinary procedures

28
Q

Physical Security Controls

A

Security measures in physical spaces.

29
Q

Lighting

A

Enhancing security with visibility.

30
Q

Fencing

A

Defining secure perimeters.

31
Q

Cameras

A

Monitoring areas for unauthorized activity.

32
Q

Bollards

A

Blocking unauthorized vehicular access.

33
Q

Access Control Vestibule

A

Two door enclosure with an entry and exit.
Only one door can be opened at a time. Prevents 1) piggybacking, when you knowingly, let the person in using your credentials and
2) tailgating, which is when someone slips through the door after you unbeknownst to you.

34
Q

Sensors & Alarms

A

Detecting motion and other activities.

35
Q

DHKE

A

Diffie-Hellman Key Exchange, a method for securely exchanging cryptographic keys.

Publicly Agreed Numbers
• Alice and Bob agree on two public numbers:
• A large prime number (let’s call it P)
• A base/generator (let’s call it G)
These numbers don’t need to be secret and can be known to everyone, including an attacker listening in.

  1. Each Person Picks a Secret Number
    • Alice picks a private number (a)
    • Bob picks a private number (b)
    • These are never shared with anyone, not even each other.
  2. Compute and Exchange Public Values

Each person uses their private number to compute a public value:
• Alice calculates:
A = (G^a) mod P (She sends A to Bob)
• Bob calculates:
B = (G^b) mod P (He sends B to Alice)
These public values (A and B) are exchanged openly, meaning even an attacker can see them.

  1. Compute the Shared Secret

Now, both Alice and Bob use the received value and their own private number to compute the same shared secret:
• Alice computes:
S = (B^a) mod P
• Bob computes:
S = (A^b) mod P
Because of the way exponentiation works in modular math, both Alice and Bob end up with the same S, even though they never directly exchanged it!

36
Q

Code Signing

A

Ensuring software integrity via digital signatures.

37
Q

PKI

A

Public Key Infrastructure for managing digital certificates.

38
Q

Certificate

A

A digital document that binds an entity with a public key.

39
Q

Certificate Authority

A

An organization that issues digital certificates.

40
Q

Intermediate CA

A

A CA with authority delegated by a higher CA.

41
Q

OCSP

A

Online Certificate Status Protocol

Allows a host to query the status of a certificate.

42
Q

Symmetric Encryption

A

Using the same key for both encryption and decryption.

43
Q

ROT13

A

A simple substitution cipher shifting letters by 13 places.

44
Q

Asymmetric Encryption

A

Using different keys for encryption and decryption.

45
Q

In-band Exchange

A

Key exchange occurring over the same communication channel.

46
Q

Out-of-band Exchange

A

Key exchange using a different communication channel.

47
Q

Key Length

A

Longer keys provide better security but require more processing power.

48
Q

Key Strength

A

Measure of encryption resistance to brute-force attacks.

49
Q

Levels of Encryption (6)

A
  1. FDE, full disc encryption
  2. Partition-level encryption
  3. Volume level encryption
  4. File-level encryption.
  5. Database-level encryption.
  6. Record-level encryption
50
Q

Hashing

A

One-way function ensuring data integrity.

51
Q

Encryption

A

Two-way function ensuring data confidentiality.

52
Q

Password Hashing

A

Securing stored passwords using hashing algorithms.

53
Q

Collision

A

When different inputs produce the same hashed output, indicating weakness.

54
Q

Hashing Algorithms

A

Common hashing functions. Produce a hash digest.

55
Q

MD5

A

An older hashing algorithm prone to collisions.

56
Q

SHA-256

A

A secure hashing function used widely in modern cryptography.

57
Q

SHA-512

A

An advanced secure hashing function for high-security needs.

58
Q

Salting

A

A way to add additional random characters to a password to make guessing it harder