Security 6.1 Flashcards
What technique would a hacker use to target the availability of network services?
Compromise hosts with bot malware to launch a coordinated attack that overwhelms a web service
Confidentiality
Information is only revealed to authorized people
Think Encryption
Confidentiality Concerns
Snooping, Eavesdropping/wiretapping, Social Engineering, dumpster diving
Snooping
this is any attempt to get access to information on a host or storage device
Eavesdropping/Wiretapping
snooping on data or telephone conversations as they pass over the network.
“tap” into a wire network or intercept unencrypted wireless transmissions
Social Engineering/Dumpster Diving
getting users to reveal information or finding printed information.
Integrity
Data being stored and transferred has not been altered without authorization.
(Think Non-Repudiation/Hashing)
Man in MIddle
hosts sits between 2 communicating nodes and captures comms and relays all communications between them.
Replay Attack
host captures another’s to some server and replays that response to gain unauthorized access.
Availability Concerns
Keeping a service running so that authorized users can access and process data whenever necessary.
(Think ACCESS)
Ex. Denial or Service D.O.S., Power Outage, Hardware Failure, Destruction, Service Outage
Authentication
One or more methods of proving that a user is who they say they are
(Proving that you are who you say you are or what you claim to be)
Non-repudiation
the assurance that someone cannot deny the validity of something.
Authorization
creating one or more barriers around the resource such that only authenticated users can gain access.
(permissions list that allows what users can do)
Accounting
Recording when and by whom a resource was accessed.
(
Hashing
the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.