Sec Two Flashcards
What is a use case?
A goal that an organization wants to achieve
What is confidentiality?
ensuring data is only viewable by authorized users
What is steganography
hiding data inside other data, such as hiding messages inside a picture
What is integrity?
ensuring that data has not been modified, tampered with, or corrupted through unauthorized or unintended changes
What is non-repudiation?
prevents entities from denying they took an action
What is availability?
Ensuring data and services are available when needed
What is risk?
the possibility of a threat exploiting a vulnerability and resulting in loss
What is a threat?
any circumstance or event that has the potential to compromise CIA
What is a vulnerability?
a weakness in hardware, software, configuration, or users operating the system
What is risk mitigation?
Reduces risk by reducing the chances that a threat will exploit a vulnerability or reducing impact of the risk
What are security controls
things that reduce risk, such as antivirus software
What are the 3 primary security control types
technical (implemented w/ tech)
administrative (implemented w/ admin or management methods)
physical (controls you can physically touch)
What are preventive controls
controls that attempt to prevent security incidents
What are detective controls?
controls that attempt to detect when a vulnerability has been exploited
What are corrective controls
controls that attempt to reverse the impact of an incident after it has occurred
What are deterrent controls
controls that attempt to prevent incidents by discouraging threats
what are compensating controls
alternative controls used when it isn’t feasible to use a primary control
what is authentication
allows entities to prove their identity by using credentials known to another entity
what is identification
occurs when a user claims or professes an identity with username, email, PIV, biometrics, etc
What are the five factors of authentication?
something you know (username/password)
something you have (smart card, token)
something you are (fingerprint, retina scan)
somewhere you are (geolocation, MAC address)
something you do (gestures)
What are the open source standards used for one-time passwords?
HOTP - creates OTP that doesn’t expire
TOTP - creates OTP that expires after 30 seconds
What are FAR, FRR, and CER in regards to biometrics?
FAR - false acceptance rate (false positive match)
FRR - false rejection rate (false negative match)
CER - crossover error rate (the point on a sensitivity vs. rate graph where FAR and FRR cross - indicates quality of biometric system)
What is kerberos?
network authentication protocol using tickets issued by KDC or TGT server
What is LDAP?
specifies formats and methods to query directories such as Active Directory. LDAPS encrypts transmissions with SSL or TLS