Security Concepts Flashcards

1.2

1
Q

What is the CIA Triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does confidentiality mean in the CIA triad?

A

Prevent disclosure of information to unauthorized individuals or systems

-Encryption
-Access Controls
-Two Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Integrity mean in the CIA triad?

A

Messages can’t be modified without detection

-Hashing (map data of arbitrary length to data of a fixed length)
-Digital Signatures
-Certificates
-Non repudiation (Proof of identity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Availability mean in the CIA triad?

A

Systems and networks must be up and running

-Redundancy (Build services that will always be available)
-Fault tolerance (System will run even when failure occurs)
-Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main functions of a hash?

A

Represents data as a short string of text (Like a fingerprint)
Verifies that data has not changed.
Does not verify that the person that sent the data is correct.
One character change in data can change the hash drastically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Identification, Authentication, Authorization, and Accounting (AAA Framework)?

A

Identification
- This is who you claim to be (Username)

Authentication
- Prove you are who you say you are (Password and other authentication factors)

Authorization
- Based on your identification and authentication, what access do you have.

Accounting
- Resources used: Login time, data sent and received, logout time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do device certificates work?

A
  • An organization will have a CA (Certificate Authority)
  • The organization creates a certificate for a device and signs it by the CA
  • When a device logs onto an org’s systems, compare the two certificates; if the device certificate was signed by the CA, then allow access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Zero Trust

A

Everything must be verified

-Nothing is inherently trusted.
-Multi-factor authentication, encryption, additional firewalls, monitoring and analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Data plane when it comes to zero trust

A

Process the frames, packets, and network data

-Switch, router, firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Control plane when it comes to zero trust

A

Manages the actions of the data plane

-Define policies and rules
-determines how packets should be forwarded
-routing tables, session tables, NAT tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PEP

A

Policy Enforcement Point

-Gatekeeper
-Everything must pass through the PEP
-The step between an untrusted system and a resource
-Allow, monitor, and terminate connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PDP

A

Policy Decision Point

-The process for making an authentication decision
-Policy Engine (Evaluates access deciosions based on policy and other information sources)
-Policy Administrator (Generates access toklens or credentials, communicates with the PEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HoneyPots

A

Attracts attackers and keeps them involved in those systems

Virtual world to explore
Usually attracts bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HoneyNet

A

Virtualized Network of HoneyPots

-Servers
-Workstations
-routers
-Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HoneyFile

A

A fake file that has fake information that would look importatnt to an attacker

-Password.txt
-Set alarms to these files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HoneyToken

A

Traceable Data in the Honeynet (If stolen you will know where it came from)

-API Credentials
-Fake Email Addresses
-Database records, browser cookies