Section 1.2 Flashcards

1
Q

What is the CIA Triad?

A

It’s a combination of principles to describe the fundamentals of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the C, I and A stand for?

A

C: Confidentiality
- Prevent disclosure of information to unauthorized individuals or systems

I: Integrity
- Messages can’t be modified without detection

A: Availability
- Systems and networks must be up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Confidentiality?

A

Definition: Certain information should only be known to certain people

Encryption is used to encode messages so only certain people can read it.
Access control are used to restrict access to resources.
Two-factor authentication is used to confirm the correct user is getting access to the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Integrity?

A

Definition: Data is stored and transferred as intended, without any changes.

Hashing is used to compare the hash of the sender with the receiver to make sure the same hash is found.
Digital signatures take hash and encrypts it to verify the integrity of data.
Certificates are used to identify devices/people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Availability?

A

Definition: information is accessible to authorized users

Redundancy: build services that will always be available
Fault tolerance: System should continue to run even when failure occurs
Patching: Ensuring stability and closing security holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is non-repudiation?

A

Non repudiation means that you cannot deny what you’ve done by using proof of integrity and proof of origin with high assurance of authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is proof of integrity?

A

Proof of integrity means that we can verify the data that we received is exactly the same data that was originally sent.

This means that the data remains accurate and consistent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a hash?

A

A hash is a short string of text that we can create based on data that is contained within the plaintext.

If any of the plaintext data changes, then the hash would also change.

It’s used to verify integrity of the data that was received is the same as the data that was sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is proof of origin?

A

Proving the source of the message.

Digital signatures are used to verify proof of origin. Digital signatures use a private key that is only known to the person sending the data. To verify the private key, a public key associated with the private key is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is authentication?

A

Proving you are who you say you are by using username/password or other authentication factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is authorization?

A

Based on the identification and authentication, what access do you have in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to authenticate a device?

A

A digitally signed certificate can be put in the device. VPNs can verify that the device is a company device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a CA?

A

A Certificate Authority (CA) is a device that manages all of our certificates in our environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Gap Analysis?

A

A gap analysis is a comparison of where we are vs where we want to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Zero Trust mean?

A

Zero trust means that you have to authenticate each time you have to get access to a particular resource.

Nothing is trusted and everything needs to be verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is meant by Planes of Operation?

A

In Zero Trust security model, the planes of operation, the Data Plane, Control Plane and Management Plane are important to enforce the “never trust, always verify” principle.

17
Q

What is Data Plane?

A

The data plane is the part of the device that is performing the actual security process. This is where data packets are transmitted between devices.

18
Q

What is the Control Plane?

A

This is where we manage the actions of the data plane. In here policies and rules are defined. Also, in here its determined how packets should be forwarded.

19
Q

What is adaptive identity?

A

This is where we exam the identity of an individual and applying security controls based on not just what the user is telling us, but other information that we have available for this authentication process.
For example:
- Someone who’s requesting data that’s located in United States, is using an IP address that’s in China. This means that we would need to add additional security measures to confirm the individual is who they say they are.

20
Q

What is threat scope reduction?

A

This is the process of limiting the possible entry points to an environment.

21
Q

What are security zones?

A

Security zones look at where are we connecting from, and where are we trying to connect to.

For example you can separate different company functions in security zones, or you can separate untrusted security zone with trusted security zones.

Then you can set up rules such as blocking all access from any untrusted zone to a trusted zone.

22
Q

What is a policy enforcement point (PEP)?

A

The policy enforcement point is a gatekeeper. All traffic must pass through the PEP to determine what traffic is allowed and blocked.

23
Q

What is a Policy Decision Point?

A

The policy decision point is the process for making an authentication decision. (allow or block traffic coming from somewhere)

24
Q

What is a Honeypot?

A

A honeypot is a way to attract attackers to your system and keep them stuck in the system to see what type of attacks they’re trying to use to attack the system.

Honeypots are not part of the production environment, but instead a virtual world build to attract attackers.

25
Q

What is a Honeynet?

A

It’s a real network that includes more than a single device. it may have servers, workstations, routers, switches and more.

26
Q

What are honeyfiles?

A

Honeyfiles have fake information, but appear to have very important information such as passwords.

27
Q

What are Honeytokens?

A

Honeytokens are traceable data to track malicious actors. For example, providing API credentials in honeyfiles, and then waiting to find out who will use these API credentials.