Security Definitions Flashcards

1
Q

What is Information Security

A

Protection of info and resources from unauthorized access, attacks, thefts. or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Risk

A

Concept that indicates exposure to the chance of damage or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Threat

A

event or action that could potentially cause damage to asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Vulnerability

A

Condition that leaves system open to harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Intrusions

A

attacker accesses computer system without the authorization to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Attacks

A

exploit vulnerability in application or physical computer system without authorization to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Controls

A

Countermeasures that you need to put in place to avoid, mitigate, or counteract security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Non-Repudiation

A

party remains associated with data they created or transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Identification

A

Ensuring the entity requesting access is true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Authentication

A

method of validating particular entity credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authorization

A

determining rights and privileges of entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Access Control

A

Determining and assigning privileges to various resources, objects or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Accounting

A

Tracking/ recording system activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Auditing

A

examining logs of what was recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Implicit Deny

A

not explicitly allowed is denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Least Privilege

A

user and software only access what they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Privilege Bracketing

A

given at beginning and taken away at end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Separation of Duties

A

no one person has to much power of responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Job Rotation

A

no one stays in one job to long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Mandatory Vacation

A

opportunity to review employee’s activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Time of Day Restrictions

A

What times users are allowed access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are Orphaned Accounts

A

user accounts remain active after employee has left

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Privilege Management

A

administration of user and group access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Cryptography

A

science of hiding info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Encryption

A

converts data from plaintext to ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Decryption

A

converts ciphertext to plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Quantum Cryptography

A

encryption based on quantum communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are Ciphers

A

algorithm used to encrypt or decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Steganography

A

hides info by hiding it in another file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are Keys

A

specific piece of info used to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Hashing Encryption

A

one-way encryption that transforms cleartext to ciphertext, not to be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Symmetric Encryption

A

two-way encryption which both encrypt and decrypt use same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is asymmetric encryption

A

using public and private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a Key Exchange

A

keys transferred among users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a Digital Signature

A

message digest that has been encrypted again with user’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are Cipher Suites

A

Collection of algorithms used to establish secure connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are Session Keys

A

Single-use key used for encrypting messages in a single series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is Key Stretching

A

Technique to strengthen weak cryptographic keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are Social Engineering Attacks

A

uses deception and trickery to obtain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Spoofing

A

human or software attack to pretend to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Impersonation

A

Human attack pretends to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a Hoax

A

email attack using trickery to convince user to delete stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is Phishing

A

Email attack pretending to be a respected company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is vishing

A

Human attack to get info over phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What s Whaling

A

targets wealthy people and organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is URL hijacking

A

exploits typos in URL address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is Spam/ Spim

A

email attack floods inbox to deliver virsus. Spim is instant messenger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is shoulder surfing

A

someone looking over your shoulder to get info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is dumpster diving

A

looking in trash for info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is Tailgating

A

walking through portal behind someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a Electronic Activist

A

wants social change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is a data thief

A

blatantly steal resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a Script Kiddie

A

Novice looking to improve skill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is Electronic Vandal

A

do as much damage as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

what is a Cyberterrorist

A

disrupt system spread fear and panic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a Malicious Code Attack

A

software attack where undesired software is inserted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a Viruses

A

Code that spreads by attaching itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is a Worm

A

Replicates itself but doesn’t attach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is Adware

A

software that downloads unwanted ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is Spyware

A

Malicious software intended to track and report usage

61
Q

What is a Trojan Horse

A

hidden malware to cause damage to system or monitors/ control

62
Q

What are Rootkits

A

code intended to take full or partial control at lowest level

63
Q

What are Logic Bombs

A

code sits dormant until right event or time

64
Q

What are Botnets

A

set of infected computers allows attacker to collectively exploit

65
Q

What is Ransomware

A

code the restricts user access to computer or data

66
Q

What is Polymorphic Malware

A

Virus encryption when decrypted changes

67
Q

What are Armored Viruses

A

trick or shield themselves for antivirus software/ professionals

68
Q

What are Software Attacks

A

attack against resources

69
Q

What are Password Attacks

A

attempts to gain or use password illegitimately

70
Q

What is a Backdoor Attack

A

software created to find a backdoor

71
Q

What are Takeover Attacks

A

attacker assumes complete control

72
Q

What are Application Attacks

A

web-based client-server applications

73
Q

What is IP Port Scanning Attacks

A

scans computers connected to Internet, looking for listening and open ports

74
Q

What are Eavesdropping Attacks

A

Monitoring software to gain access to gain info

75
Q

What are Man-in-the-Middle

A

makes independent connection

76
Q

What are Replay Attacks

A

captured network traffic retransmitted later

77
Q

What are DoS Attacks

A

attempt to disrupt or disable system

78
Q

What is Session Hijacking

A

exploits computer in session to obtain info

79
Q

What is Peer-to-Peer Attacks

A

Malware propagated through P2P networks

80
Q

What is ARP Poisoning

A

IP address redirected to MAC address of choosing

81
Q

What is Transitive Access Attacks

A

members using data without authentication

82
Q

What are Rogue Access Points

A

unauthorized WAP on network

83
Q

What are Evil Twins

A

AP that fool users into believing the are legit

84
Q

What is Jamming

A

radio waves disrupt 802.11 signals

85
Q

What is Bluejacking

A

sending of unwanted Bluetooth signals

86
Q

What is Bluesnarfing

A

gain access to unauthorized info. Within 30 feet

87
Q

What is War Chalking

A

Marks indicating WAP

88
Q

What are Sinkhole Attacks

A

single node in which all traffic goes through

89
Q

What is Layered Security

A

uses different avenues of defense

90
Q

What is Defense in Depth

A

plan personnel training, policy adoption, physical protection, security strategies

91
Q

What is Data Security

A

security controls/ measures to keep data safe, accessible, prevent unauthorized access

92
Q

What are Data Security Vulnerabilities

A

cloud computing, lock of restricted access, lack of user awareness

93
Q

What are Hardware-Based Encryption Devices

A

cryptographic module called Hardware Security Module

94
Q

What is a Trusted Platform Module

A

cryptoprocessers create secure computing environment

95
Q

What is a Hardware Security Module

A

cryptoprocessor device attached to servers/ computers provide digital key

96
Q

What is Data at Rest

A

data that is stored, database, disk

97
Q

What is Data in Transit

A

Data moving across network

98
Q

What is Data in Use

A

data that is not at rest or in transit

99
Q

What is Big Data

A

Large complex data collections

100
Q

What is Patch Management

A

monitoring, obtaining, evaluating, testing, deploying. software patches/updates

101
Q

What is a Configuration baseline

A

minimum security requirements needed for app to be complete

102
Q

What is Application Hardening

A

Process used to configure a default app to prevent security threats/ vulnerabilities

103
Q

What is Patch Management

A

third-party software to ensure every app is running with latest security requirements/updates

104
Q

What is Input Validation

A

data entered in field or variable in app is within acceptable bounds

105
Q

What is Command Injection

A

attacker sends additional commands to app through unchecked input fields

106
Q

What is a stored attack

A

attacker injects malicious code or link into website

107
Q

What is a Reflected Attack

A

poses as legitimate user sends info to server

108
Q

What is a Cross-site request forgery attack

A

attacker takes advantage of trust between authorized user and website

109
Q

What is Fuzzing

A

testing method used to identify weaknesses in app by sending app random data

110
Q

What is Hardening

A

default configuration is altered to try and close vulnerabilities

111
Q

What is a trusted computing base

A

hardware, firmware. software responsible for ensuring security policy is implemented

112
Q

What is a Security Baseline

A

Collection of security/ configuration settings applied to host

113
Q

What is Application Blacklisting

A

practice of preventing apps you don’t want do to security issues

114
Q

What is Application Whitelisting

A

list of approved apps and only those can be installed

115
Q

What is Logging

A

record data about activity on computer

116
Q

What is Auditing

A

assessment of the security strengths and weaknesses

117
Q

What is Anti-malware Software

A

Protective software the scans for known viruses, Trojans, worms, and other malicious programs

118
Q

What is a Strong Password

A

Meets complexity requirements set by system admins

119
Q

What is a Web Security Gateways

A

utility primarily to intentionally block internal Internet access

120
Q

What is NetBIOS

A

interface that allows apps to properly communicate over different computers in a network

121
Q

What is a Directory Service

A

network service that stores identity info

122
Q

What is Lightweight Directory Access Protocol

A

it is an authentication service

123
Q

What is Tunneling

A

data transport that provides remote access in which data is encrypted/ encapsulated in another data packet

124
Q

What is HMAC based one-time password

A

algorithm that generates One-time passwords

125
Q

What is Timed HMAC based one-time password

A

adds a time based factor to HMAC

126
Q

What is Password Authentication Protocol

A

sends user ID’s and passwords as plaintext

127
Q

What is Challenge Handshake Authentication Protocol

A

encrypted protocol used to provide access control for remote servers

128
Q

What is Pretty Good Privacy (PGP)

A

publicly available email security utility that uses public Key cryptography

129
Q

What is GNU Privacy Guard (GPG)

A

open-source version of PGP provides equivalent encryption

130
Q

What is Kerberos

A

authentication service based on time-sensitive ticket granting system

131
Q

What is Security Assertion Markup Language (SAML)

A

data format used to exchange authentication info from server, service and identity provider

132
Q

What is Account Federation

A

linking single account across many different account management systems

133
Q

What are Digital Certificates

A

Electronic document that associates credentials with public key

134
Q

What is a Certificate Authority (CA)

A

Server that issues certificates

135
Q

What is Public Key Infrastructure (PKI)

A

System of CA’s, certificates, software, services

136
Q

What is Registration Authority (RA)

A

Responsible for verifying users’ identities and approving/ denying requests

137
Q

What is Certificate Repository Database (CRD)

A

Stores digital certificates

138
Q

What is Certificate Management System (CMS)

A

Provide software tools to perform day to day functions of PKI

139
Q

What is Certificate Signing Request (CSR)

A

Message sent to CA where resource applies for certificate

140
Q

What is Public Key Cryptography Standards (PKCS)

A

Common CSR format designed to send info over Internet in secure manner using PKI

141
Q

What is Root CA

A

Topmost CA in hierarchy and most trusted authority

142
Q

What are Subordinate CA’s

A

Any CA’s below the Root CA

143
Q

What is Key Escrow

A

Alternative to key backups, allows one or more third party access

144
Q

What is the M of N scheme

A

Mathematical Control takes into account number of key recovery agents along with number of agents required to perform key recovery. They must match

145
Q

What is Encrypting File System (EFS)

A

Uses Microsoft Windows NTFS-based public Key encryption

146
Q

What is Certificate Revocation List (CRL)

A

List of certificates that were revoked before expiration date

147
Q

What is Online Certificate Status Protocol (OCSP)

A

HTTP alternative to CRL for checking the status of revoked certificates

148
Q

What is Physical Security Controls

A

security measures that restrict, detect, and monitor assets

149
Q

What is Compliance

A

practice of ensuring requirements of legislation, regs, standards are met