Review Flashcards
To protect assets using Prevention, Detection, and recovery
The goal of cyber security
Authentication, Non-Repudiation, Confidentiality, and Integrity
The attributes/properties provided by cyber security
Anyplace entities with different privileges interact.
Trust boundary
A high level statement of what is, and what is not, allowed.
A security policy
Integrity, confidentiality, and availability
The 3 pillars of cyber security
A subset of substitution ciphers where a character is substituted for another one a certain characters away. Caesar for example
Shift cipher
Security mechanisms are implemented, installed and administered correctly
One of the false assumptions of security
Read, write and execute
The standard unix/ transactional permissions
A user, process or program must be able to access ONLY the information and resources that are necessary for its legitimate purpose
The principle of least privilege
Vertical and Horizontal
The two types of privilege escalation
The practice of defending computers, servers, mobile devices… from malicious attacks. Also know as information technology or electronic information security
Cyber security
The trustworthiness if data or resources. The knowledge that data has not been tampered or altered
Integrity
A method, tool or procedure for enforcing a security policy
Security mechanism
The concealment of information resources
Confidentiality
To transform or encipher a message or plaintext into ‘an intermediate form’ or ciphertext in which the original information is present but hidden
The goal of Cryptography
A detailed statement regarding the implementation of a security mechanism
A Specification
38% of breaches were reportedly caused by thus type of vulnerability
Web Application Vulberability
Uses a single key for both encryption and decryption
Symmetric our secret key encryption
Exchange, Storage, and Use
The Key Factors of proper Key Management