Section 2 Flashcards
Which concept of the CIA Triad is associated with reliability?
Integrity
A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected?
Confidentiality
A user changes a number in a dataset with a typo. Which side of the CIA triad is most affected?
Integrity
Types of identification
“something you know”
“something you are”
“something you have”
What is the final step in allowing access to resources?
authorization
discretionary access control
Owner determines who gets access and what level
mandatory access control
- owner doesn’t get to decide
- Separate group w/ authority sets access (gov. organizations)
Rule-based access control
access according to a set of rules
Attribute-based access control
based on specific attributes of a person, resource, or environment
Which attribute of the Parkerian hexad allows for proper attribution of the owner of a dataset?
Authenticity
- process of ensuring and confirming that the identity of the user is genuine and legitimate. Proving who you are.
Which type of attack category is an attack against confidentiality?
Interception
Incident Response steps
- preparation
- detection and analysis
- containment
- eradication
- recovery
- post incident activity
Mutual authentication
What is the name of the process where the client authenticates the server and the server authenticates the client?
Why are audits performed?
Audits are performed to ensure compliance with applicable laws, policies, and other administrative controls is being accomplished as well as detecting misuse.