overview of Security Flashcards

1
Q

Information Security

A

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption and destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Act of protecting the systems that hold and process our critical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

This consists of: Confidentiality, Integrity and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Information has not been disclosed to unauthorized people. Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Information has not been altered or modified without proper authorization. This includes hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

Information is able to be stored, accessed, or protected at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAA Security

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

When a persons identity is established with proof and confirmed by a system.
- Something you know - password
- Something you are - fingerprint
- Something you have - Token
- Something you do - how you speak etc.
- Somewhere you are - your actual location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization

A

Occurs when a user is given access to a certain piece of data or a certain area of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accounting

A

tracking of data, computer usage, and network resources.
-non-repudiation occurs when you have proof that someone has taken an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malware

A

Short-hand term for malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unauthorized access

A

Occurs when access to computer resources and data occurs without the consent of the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System Failure

A

Occurs when a computer crashes or an individual application fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Engineering

A

Act of manipulating users into revealing confidential information or performing other detrimental actions. This occurs as phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

physical controls

A

Alarm systems, locks, surveillance cameras, identification cards, and security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Technical Controls

A

Smart cards, encryption, access control lists (ACL’s), intrusion detection systems, and network authentication.

17
Q

Administrative Controls

A

Policies, procedures, security awareness training, contingency planning, and disaster recovery plans.
- User training is the most cost effective security control to use.

18
Q

White Hat Hackers

A

Non-malicious hackers who attempt to break into a company’s systems at their request.

19
Q

Black Hat Hackers

A

malicious hackers who break into computer systems and networks without authorization or permission

20
Q

Gray Hat Hackers

A

Hackers without any affiliation to a company who attempt to break into a company’s network but risk the law in doing so.

21
Q

Blue Hat Hackers

A

Hackers who attempt to hack into a network with permission of the company but are not employed by the company.

22
Q

Elite Hackers

A

Hackers who find and exploit vulnerabilities before anyone else does.
- 1 in 10,000 are elite

23
Q

Script Kiddies

A

Hackers with little to no skill who only use the tools and exploits written by others.

24
Q

Hacktivists

A

Hackers who are driven by a cause like a social change, political agendas, or terrorism.

25
Q

Organized Crime

A

Hackers who are part of a crime group that is well-funded and highly sophisticated

26
Q

Advanced Persistent Threats

A

Highly trained and funded group of hackers (often by nation states) with covert an open-source intelligence at their disposal