Security Definitions Flashcards
What is Information Security
Protection of info and resources from unauthorized access, attacks, thefts. or data
What is Risk
Concept that indicates exposure to the chance of damage or loss
What is a Threat
event or action that could potentially cause damage to asset
What is a Vulnerability
Condition that leaves system open to harm
What are Intrusions
attacker accesses computer system without the authorization to do so
What are Attacks
exploit vulnerability in application or physical computer system without authorization to do so
What are Controls
Countermeasures that you need to put in place to avoid, mitigate, or counteract security risks
What is Non-Repudiation
party remains associated with data they created or transferred
What is Identification
Ensuring the entity requesting access is true
What is Authentication
method of validating particular entity credentials
What is Authorization
determining rights and privileges of entity
What is Access Control
Determining and assigning privileges to various resources, objects or data
What is Accounting
Tracking/ recording system activities
What is Auditing
examining logs of what was recorded
What is Implicit Deny
not explicitly allowed is denied
What is Least Privilege
user and software only access what they need
What is Privilege Bracketing
given at beginning and taken away at end
What is Separation of Duties
no one person has to much power of responsibility
What is Job Rotation
no one stays in one job to long
What is Mandatory Vacation
opportunity to review employee’s activities
What are Time of Day Restrictions
What times users are allowed access
What are Orphaned Accounts
user accounts remain active after employee has left
What is Privilege Management
administration of user and group access control
What is Cryptography
science of hiding info
What is Encryption
converts data from plaintext to ciphertext
What is Decryption
converts ciphertext to plaintext
What is Quantum Cryptography
encryption based on quantum communication
What are Ciphers
algorithm used to encrypt or decrypt data
What is Steganography
hides info by hiding it in another file
What are Keys
specific piece of info used to encrypt and decrypt
What is Hashing Encryption
one-way encryption that transforms cleartext to ciphertext, not to be decrypted
What is Symmetric Encryption
two-way encryption which both encrypt and decrypt use same key
What is asymmetric encryption
using public and private keys
What is a Key Exchange
keys transferred among users
What is a Digital Signature
message digest that has been encrypted again with user’s private key
What are Cipher Suites
Collection of algorithms used to establish secure connection
What are Session Keys
Single-use key used for encrypting messages in a single series
What is Key Stretching
Technique to strengthen weak cryptographic keys
What are Social Engineering Attacks
uses deception and trickery to obtain data
What is Spoofing
human or software attack to pretend to be someone else
What is Impersonation
Human attack pretends to be someone else
What is a Hoax
email attack using trickery to convince user to delete stuff
What is Phishing
Email attack pretending to be a respected company
What is vishing
Human attack to get info over phone
What s Whaling
targets wealthy people and organizations
What is URL hijacking
exploits typos in URL address
What is Spam/ Spim
email attack floods inbox to deliver virsus. Spim is instant messenger
What is shoulder surfing
someone looking over your shoulder to get info
What is dumpster diving
looking in trash for info
What is Tailgating
walking through portal behind someone
What is a Electronic Activist
wants social change
What is a data thief
blatantly steal resources
What is a Script Kiddie
Novice looking to improve skill
What is Electronic Vandal
do as much damage as possible
what is a Cyberterrorist
disrupt system spread fear and panic
What is a Malicious Code Attack
software attack where undesired software is inserted
What is a Viruses
Code that spreads by attaching itself
What is a Worm
Replicates itself but doesn’t attach
What is Adware
software that downloads unwanted ads
What is Spyware
Malicious software intended to track and report usage
What is a Trojan Horse
hidden malware to cause damage to system or monitors/ control
What are Rootkits
code intended to take full or partial control at lowest level
What are Logic Bombs
code sits dormant until right event or time
What are Botnets
set of infected computers allows attacker to collectively exploit
What is Ransomware
code the restricts user access to computer or data
What is Polymorphic Malware
Virus encryption when decrypted changes
What are Armored Viruses
trick or shield themselves for antivirus software/ professionals
What are Software Attacks
attack against resources
What are Password Attacks
attempts to gain or use password illegitimately
What is a Backdoor Attack
software created to find a backdoor
What are Takeover Attacks
attacker assumes complete control
What are Application Attacks
web-based client-server applications
What is IP Port Scanning Attacks
scans computers connected to Internet, looking for listening and open ports
What are Eavesdropping Attacks
Monitoring software to gain access to gain info
What are Man-in-the-Middle
makes independent connection
What are Replay Attacks
captured network traffic retransmitted later
What are DoS Attacks
attempt to disrupt or disable system
What is Session Hijacking
exploits computer in session to obtain info
What is Peer-to-Peer Attacks
Malware propagated through P2P networks
What is ARP Poisoning
IP address redirected to MAC address of choosing
What is Transitive Access Attacks
members using data without authentication
What are Rogue Access Points
unauthorized WAP on network
What are Evil Twins
AP that fool users into believing the are legit
What is Jamming
radio waves disrupt 802.11 signals
What is Bluejacking
sending of unwanted Bluetooth signals
What is Bluesnarfing
gain access to unauthorized info. Within 30 feet
What is War Chalking
Marks indicating WAP
What are Sinkhole Attacks
single node in which all traffic goes through
What is Layered Security
uses different avenues of defense
What is Defense in Depth
plan personnel training, policy adoption, physical protection, security strategies
What is Data Security
security controls/ measures to keep data safe, accessible, prevent unauthorized access
What are Data Security Vulnerabilities
cloud computing, lock of restricted access, lack of user awareness
What are Hardware-Based Encryption Devices
cryptographic module called Hardware Security Module
What is a Trusted Platform Module
cryptoprocessers create secure computing environment
What is a Hardware Security Module
cryptoprocessor device attached to servers/ computers provide digital key
What is Data at Rest
data that is stored, database, disk
What is Data in Transit
Data moving across network
What is Data in Use
data that is not at rest or in transit
What is Big Data
Large complex data collections
What is Patch Management
monitoring, obtaining, evaluating, testing, deploying. software patches/updates
What is a Configuration baseline
minimum security requirements needed for app to be complete
What is Application Hardening
Process used to configure a default app to prevent security threats/ vulnerabilities
What is Patch Management
third-party software to ensure every app is running with latest security requirements/updates
What is Input Validation
data entered in field or variable in app is within acceptable bounds
What is Command Injection
attacker sends additional commands to app through unchecked input fields
What is a stored attack
attacker injects malicious code or link into website
What is a Reflected Attack
poses as legitimate user sends info to server
What is a Cross-site request forgery attack
attacker takes advantage of trust between authorized user and website
What is Fuzzing
testing method used to identify weaknesses in app by sending app random data
What is Hardening
default configuration is altered to try and close vulnerabilities
What is a trusted computing base
hardware, firmware. software responsible for ensuring security policy is implemented
What is a Security Baseline
Collection of security/ configuration settings applied to host
What is Application Blacklisting
practice of preventing apps you don’t want do to security issues
What is Application Whitelisting
list of approved apps and only those can be installed
What is Logging
record data about activity on computer
What is Auditing
assessment of the security strengths and weaknesses
What is Anti-malware Software
Protective software the scans for known viruses, Trojans, worms, and other malicious programs
What is a Strong Password
Meets complexity requirements set by system admins
What is a Web Security Gateways
utility primarily to intentionally block internal Internet access
What is NetBIOS
interface that allows apps to properly communicate over different computers in a network
What is a Directory Service
network service that stores identity info
What is Lightweight Directory Access Protocol
it is an authentication service
What is Tunneling
data transport that provides remote access in which data is encrypted/ encapsulated in another data packet
What is HMAC based one-time password
algorithm that generates One-time passwords
What is Timed HMAC based one-time password
adds a time based factor to HMAC
What is Password Authentication Protocol
sends user ID’s and passwords as plaintext
What is Challenge Handshake Authentication Protocol
encrypted protocol used to provide access control for remote servers
What is Pretty Good Privacy (PGP)
publicly available email security utility that uses public Key cryptography
What is GNU Privacy Guard (GPG)
open-source version of PGP provides equivalent encryption
What is Kerberos
authentication service based on time-sensitive ticket granting system
What is Security Assertion Markup Language (SAML)
data format used to exchange authentication info from server, service and identity provider
What is Account Federation
linking single account across many different account management systems
What are Digital Certificates
Electronic document that associates credentials with public key
What is a Certificate Authority (CA)
Server that issues certificates
What is Public Key Infrastructure (PKI)
System of CA’s, certificates, software, services
What is Registration Authority (RA)
Responsible for verifying users’ identities and approving/ denying requests
What is Certificate Repository Database (CRD)
Stores digital certificates
What is Certificate Management System (CMS)
Provide software tools to perform day to day functions of PKI
What is Certificate Signing Request (CSR)
Message sent to CA where resource applies for certificate
What is Public Key Cryptography Standards (PKCS)
Common CSR format designed to send info over Internet in secure manner using PKI
What is Root CA
Topmost CA in hierarchy and most trusted authority
What are Subordinate CA’s
Any CA’s below the Root CA
What is Key Escrow
Alternative to key backups, allows one or more third party access
What is the M of N scheme
Mathematical Control takes into account number of key recovery agents along with number of agents required to perform key recovery. They must match
What is Encrypting File System (EFS)
Uses Microsoft Windows NTFS-based public Key encryption
What is Certificate Revocation List (CRL)
List of certificates that were revoked before expiration date
What is Online Certificate Status Protocol (OCSP)
HTTP alternative to CRL for checking the status of revoked certificates
What is Physical Security Controls
security measures that restrict, detect, and monitor assets
What is Compliance
practice of ensuring requirements of legislation, regs, standards are met