Network and Computer Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What does CIA stand for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Identification

A

Associating an indentity with a subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Authentication

A

Verifying the validity of something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Authorization

A

Granting (or denying) the right or permission of a system entity to access an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Access Control

A

Controlling the access of system entities (on behalf of subjects) to objects based on an access control policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are four widely used mechanisms for authentication?

A
  1. Something you know - Password/PIN
  2. Something you have - Smart card or one-time password
  3. Something you are - Biometric Characteristics/Facial Scan/Photograph
  4. Location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do good systems include?

A

Allow for passwords and validate passwords securely
How to access systems securely that require a password
Allow passwords of arbitrary length
Store passwords hashed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Social Engineering

A

Tricking people into giving up private information or doing things they shouldn’t, usually by pretending to be someone they trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define a Soft Token

A

A one-time use password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a bad example of a Hard Token?

A

UniCard as it could easily be duplicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Biometric Scan?

A

Uses characteristics of your body
- Fingerprint
- Retina scan
- Face scan
To authenticate your identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do Typical Access Control models focus on?

A

Authorization
- Specification of who is allowed to do what
- How to update/change permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give an example of a simple access control model.

A

AC = Subject x Object x Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List 4 key factors of access control models.

A
  1. Often depend on system state
  2. Subjects and permissionsd change over time
  3. Access rights might require the fulfillment of obligations
  4. They are prone to implementation and configuration mistakes (bugs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a security policy do?

A

Defines what is allowed (and/or forbidden)
- It is analogous to a set of laws
- Defined in terms of rules and/or requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a security model?

A

A representation of a class of systems (and their behaviour)

17
Q
A