Section 2: Key Concepts, Identification and Authorization Flashcards
5 things that would make you’re information insecure.
- Not applying security patches or app updates to your system
- using weak passwords such as ‘password”
- Downloading programs from the internet
- Opening email attachments from unknown senders
- Using wireless networks without encryption
4 examples of ways confidentiality could be compromised (ATM example)
- You could lose your laptop containing data
- Someone could look over your shoulder while you enter the password.
- You could send an email attachment to the wrong person
- Attackers could penetrate your system
Two things needed to maintain integrity
- you need to have the means to prevent unauthorized changes to your data
- you need the ability to reverse unwanted authorized changes.
When is integrity particularly important?
when it concerns data that provides the foundation for other decisions
4 examples of things that may cause you to lose availability of your data.
- power loss
- operating system or application problems
- network attacks
- a compromised system
What is it called when an outside party like an attacker causes availability issues.
a DoS attack
(Denial of Service)
What 6 principles make up the Parkerian Hexad?
- Confidentiality
- Integrity
- Availability
- Possession / Control
- Authenticity
- Utility
How is Integrity defined differently in the Parkerian Hexad model than it is in the CIA Triad.
In Parkerian Hexad, integrity doesn’t account for authorized but incorrect modification of data. The data must be whole and completely unchanged from its previous state.
IF you send an email message that’s altered so it appears to have come from a different email than the one it was sent from, which Parkerian Hexad principle was violated?
Authenticity
Which principle of the Parkerian Hexad isn’t necessarily binary in nature?
Utility
What are the 4 categories of attacks?
- Interception
- Interruption
- Modification
- Fabrication
What type or types of attacks primarily affect Confidentiality?
(CIA Triad)
Interception
What type or types of attacks primarily affect Integrity?
(CIA Triad)
- Interruption
- Modification
- Fabrication
What type or types of attacks primarily affect Availability?
(CIA Triad)
- Interruption
- Modification
- Fabrication
What are interception attacks?
1.
2.
3.
- Unauthorized file viewing or copying
- Eavesdropping on phone conversations
- Reading someone else’s email
What kind of data can interception attacks be conducted?
Data at rest and data in motion
Where is data at rest usually stored?
- hard drive
- flash drive
- database
(Can be more)
What kind of protection does data at rest usually have?
some sort of encryption, often at the level of the file or the entire storage device
What kind of protection does data in motion usually have?
encryption, but the encryption protects the network protocol or path used to move data from one place to another lol.
What kind of protections surround data in use?
Permissions and authentication of users
What are interruption attacks?
They make your assets unusable or unavailable either temporarily or permanently
What are modification attacks?
Involve tampering with an asset
What are Fabrication Attacks?
Involve generating data, processes, communications, or other similar material.
What is a threat?
Something that has the potential to cause harm and tends to be specific to certain environments