System Security 11 Flashcards
What is the principle of least privilege
Dictates that users and software should only have the minimal level of access that is needed to perform their duties.
Name the four major factors to achieve security
Authorization. Process of determining what rights and privileges an entity has
Access control. Process of determining and assigning privileges to resources, objects or data
Accountability. Process of determining who to hold responsible for particular activities or events
Auditing. The process of tracking or recording system activities and resource access.
What is privilege bracketing
The network or security admin can allow privileges when needed and then revoke them when the task or need has passed
What is non-repudiation
The goal of ensuring that data remains associated with the party that creates it or sends a transmission with that data
Describe the CIA Triad
Information security address three specific principles: confidentiality, integrity and availability. If one is compromised the security of the organization is compromised.
Explain the CIA Triad principle of confidentiality
Principle of keeping info and communication private and protecting it from unauthorized access
Explain the CIA Triad principle of integrity
Principle of keeping organizational info accurate, free of errors and without unauthorized modifications.
Explain the CIA Triad principle of availability
Principle of ensuring that systems operate continuously and that authorized persons can access the data as they need
In computer security what is a threat
Any event or action that could potentially result in a violation of a security requirement, policy or procedure. Potential threats include:
Unintentional or unauthorized access or changes to data
Interruption of services and access to assets
Damage to hardware
Unauthorized access or damage to facilities.
In terms of computer security what is a vulnerability
Any condition that leaves a system open to an attack
Can include improperly configured or installed hardware or software
Bugs in software or OS
Misuse of software or communication protocols
Poorly designed networks
Poor physical security
Insecure passwords
Design flaws in software or OS
Unchecked user input
In computer security want is an attack
A technique used to exploit a vulnerability in any application on a computer system without the authorization to do so. Include: physical Network based Software based Social engineering Web applications based.
In computer security what is a risk
Exposure to the chance of damage or loss. Signifies the likelihood of a hazard or threat occurring.
Often associated with the loss of a system, power, or network, and other physical losses
The determining factor when looking at information systems security
What is unauthorized access
Any type of network or data access not explicitly approved by an organization
Can be deliberate by an outsider, a misuse of valid privileges by an authorized user or inadvertent.
Does not necessarily result in data loss or damage.
What is data theft
A type of attack resulting in unauthorized access used to obtain protected network information.
Attack can use stolen credentials to authenticate to a server and read data stored in files or can steal cars in transit on the network media by using a packet sniffer
Describe the terms hackers and attackers
Hacking used to be described as having technical skill and creativity now associated with illegal or malicious system intrusions. Attacker always represents malicious system intruder
What are white hat and black hat hackers
White hat is a hacker who discovers and exposes security flaws in applications and OSs so they manufacturers can fix them before becoming wide spread. Does this on a professional basis. Aka ethical hack
A black hat is a hacker who discovers and exposes security vulnerabilities for financial gain or a malicious purpose.
What is a permission
A security setting they determined the level of access a user or group account has to a particular resource
The three types of UNIX permissions
R-read. View file content. See in the directory
W-write. Modify file contents. Create and delete directory contents.
X-execute. Run the file. Move into the directory.
What are NTFS permissions
New Technology File System
On windows OSs. File level security is supported on drives formatted to use the NTFS. these permissions can be applied to folders or files.
What is a group policy in relation to system security
A centralized account management feature available for Active Directory on Windows Server systems
Used to control security feature such as limiting the desktop icons that get displayed, granting permission to access certain servers but not others or locking down a desktop
In terms of security what is authentication and the factors it is based on
The method of uniquely validating a particular entity or individuals credentials
Factors include
Something you know, are, have.
One of the most basic and widely used authentication schemes
User name/password authentication.
A system compares the users credentials against credentials stores in a database.
Not very secure.
Describe a strong password
A password that meets the complexity requirements set by a system admin and documents in a security policy