Physical and software security controls Flashcards

1
Q

What is a “zero-day” attack? Why is it so effective for hackers?

A

Zero-day attacks leave no time (zero days) to respond to the threat. There
has been no preparation, as the threat or vulnerability was previously
unknown. These attacks include web application attacks, client-side attacks
and buffer overflow attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between a vulnerability and an exploit?

A

A vulnerability is a weakness in an application, an exploit is when an agent
makes use of that weakness to take advantage of an insecure situation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Only certain users are permitted to view the information because they have…

A

Authorisation

Access to confidential and sensitive information is available only to those who have authorisation; anyone not authorised is denied access.

Implementation relies on usernames, passwords, access control lists and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Defence against attackers is increasingly difficult due to:

A
  • complexity of attack tools.
  • greater sophistication of attacks.
  • delays in patching software products.

Threats are increasing due to availability of software tools, complexity and
improved planning of attacks and delays once vulnerabilities have been
identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process that ensures an individual is who they claim to be is
known as…

A

Authentication

Typical processes to identify authorised personnel are: Security passes
to authorise access to secure areas; biometric authentication for
authorised personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly