Security + Flashcards
What is the CIA triangle?
Confidentiality, Integrity, Availability. Loss of one one can lead to another.
What are causes of compromised security?
Technology weaknesses, Configuration weaknesses, Policy weaknesses, Human Error or malice
What are some of the biometric devices used?
Fingerprint scanner, hand geometry scanner, eye scanner (including retina and iris scanners), voice verification, signature verification, and DNA scan
What are some Malware varieties?
Virus, Worm, Trojan horse, Logic bomb, Rootkit, Spyware, Adware, Keylogger, Botnet, Backdoor, Drive by download, zero day exploit
What is a virus?
A computer virus is a destructive application that is loaded on your computer. A virus is a program, not data, and you can only catch a virus by running a program.
Describe the structure of a virus
Replication - viruses must propagate themselves. Payload - the malicious activity a virus performs when triggered. Payload trigger - The date or counter or circumstances present when a virus payload goes off.
What is DoS?
Denial of Service
What is DDoS?
Distributed denial of service
Name some examples of payload
Displaying messages, launching DDoS attack Erasing files randomly by type or usage, formatting hard drive, overwrite mainboard bios, sending email, expose private information
What is encryption?
Converting to unreadable format
Decryption
Converting back to readable format
Algorithm
Procedure for encrypting or decrypting
Cipher
Pair of encryption and decryption algorithms
Cryptography
Science of encryption
Phishing
the activity of defrauding an online account holder of financial information by posing as a legitimate company
Whaling
A type of fraud that targets high-profile end users
Vishing
The act of using the telephone in an attempt to scam the user into surrendering private information
Steganography
Hidden messages, often plain text, concealed in images etc.
Hashes
Fixed length derivation of plaintext
Three factors for authentication
biometrics, cac card, password (something you are, something you have, something you know)
What is the biggest authentication vulnerability
Failed password attempts that don’t result in banning
What are some authentication vulnerabilities
Short and insecure passwords, reusing passwords, saved passwords, protocol and algorithm deficiencies, failed attempts that dont result in banning
How many anivirus and anti spyware programs should you have?
one antivirus, and as many anti spyware as you want
Give an example of a two factor password
CAC followed by biometrics
What is a trojan horse?
A backdoor installed into your computer so that it can be controlled
What is a worm?
Like a virus, but it self replicates continuously until it eventually crashes your computer
When updating BIOS, what do you not want to do?
Do not turn off computer
What is a botnet?
a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge, e.g., to send spam messages
Give some examples of physical access control
ID badges, proximity cards, smart cards, physical tokens, common access cards, biometrics
What does social engineering mostly exploit?
Exploits trust between people
What kind of malware is the most common?
Spyware (adware)