test2 Flashcards
early macro-type virus, attach themselves into a document
Melisa
virus for for stealing information
duqu
Philippine students, spread by email
Love you
characterized by a greater amount of planning, a longer period of time to conduct the activity, more financial backing to accomplish it, and the possible corruption of, or collusion with, insiders
Structured threat
generally, is short-term in nature, does not involve a large group of individuals, does not have large financial backing, and does not include collusion with insiders
Unstructured threat
characterized by a much longer period of preparation (years is not uncommon), tremendous financial backing, and a large and organized group of attackers.
highly structured threat
In general terms, the methods, techniques, and tools used to ensure that a computersystem is secure.
Computer security
A hacker who has the skill level necessary to discover and exploit new vulnerabilities
Elite hacker
A hacker who uses his or her skills for political purposes
Hacktivist
A hacker with little true technical skill and hence who uses only scripts that someone elsedeveloped.
Script kiddie
The act of deliberately accessing computer systems and networks without authorization is generally know
Hacking
CIA
Confidentiality + Integrity + Availability
Protection
Prevention + ( Detection + Response)
For many years, the focus of security was on
prevention
the set of activities employed to establish a communication channel between two parties, identifying each in a manner that allows future activity without renewed authentication.
Session Management
invocation of conditions that fall outside the normal sequence of operation
Exception Management
to the proper operation of IT systems. IT systems are first and foremost systems, groups of elements that work together to achieve a desired resultant process. The proper configuration and provisioning of all of the components in a system is essential to the proper operation of the system. The design and operation of the elements to ensure the proper functional environment of a system
Configuration Management
takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole
Host Security
an emphasis is placed on controlling access to internal computers from external entities
Network Security
Use minimum privileges necessary to perform a task.
Least privilege
Access should be based on more than one item.
Separation of privilege
Deny by default (implicit deny) and only grant access with explicit permission
Fail-safe defaults
Mechanisms should be small and simple
Economy of mechanism
Protection mechanisms should cover every access to every object
Complete mediation
Protection mechanisms should not depend upon secrecy of the mechanism itself
Open design
Protection mechanisms should be shared to the least degree possible among users
Least common mechanism
Protection mechanisms should not impact users, or if they do, the impact should be minimal
Psychological acceptability
This is sometimes called default deny, and the common operational term for this approach
implicit deny.
An approach to security using the mechanism of hiding information to protect it.
Security through obscurity
Applying this principle to the people side of the security function results in the concept
separation of duties.
addresses data confidentiality in computer operating systems
Bell-LaPadula security model
defined by controlling read and write access based on conflict of interest rules
Brewer-Nash security model
instead of security classifications, integrity levels are used
The Biba Security Model
an integrity-based security model that bases its security on control of the processes that are allowed to modify critical data, referred to as constrained data items.
The Clark-Wilson Security Model
focuses on protecting each computer and device individually, whereas network security focuses on addressing protection of the network as a whole.
Host security
that multiple layers of differing, overlapping controls should be employed
defense in depth, or layered security
concept that complements the idea of various layers of security. It means to make the layers dissimilar so that if one layer is penetrated, the next layer can’t also be penetrated using the same method
Diversity of defense
the process of combining seemingly unimportant information with other pieces of information to divulge potentially sensitive information
phishing attack
The security principle used in the Bell-LaPadula security model that states that no subject can read from an object with a higher security classification
Simple Security Rule
agreed-upon formats for exchanging or transmitting data between systems, enable computers to communicate
protocol
physical arrangement of a network is typically called
network’s topology
When data is transmitted over a network, it is usually broken up into smaller pieces called
packets
connection oriented, requires the three-way handshake to initiate a connection, and provides guaranteed and reliable data delivery
TCP
connectionless, lightweight, and provides limited error checking and no delivery guarantee
UDP
group of two or more devices linked together to share data
network
Moving packets from source to destination across multiple networks
routing
three-way handshake sequence
SYN, SYN/ACK, ACK
extension of a selected portion of a company’s intranet to external partners
Extranet
describes a network that has the same functionality as the Internet for users but lies completely inside the trusted area of a network and is under the security control of the system and network administrators
Intranet
military term for ground separating two opposing forces, by agreement and for the purpose of acting as a buffer between the two sides
DMZ
networking equipment that connects devices that are using the same protocol at the physical layer of the OSI model
Hubs
networking equipment that connect devices using the same protocol at the data link layer of the OSI model
Bridges
forms the basis for connections in most Ethernet-based LANs
Switches
network traffic management device used to connect different network segments together
router
construct used to provide a secure communication channel between users across public networks such as the Internet
virtual private network (VPN)
The most common implementation of VPN is via IPsec, a protocol for IP security
true
Window communication protocol
NetBeui
10BASE2
thinnet, 10Mb/s, length 200m
10BASE5
500m
NAC
cisco
NAP
Microsoft
Coaxial cable carries how many physical channels
one
SSH
22
FTP
20-21
HTTP
80
SNMP
161
HTTPS
443
pieces of malware that require a file to infect a system
Viruses