Threats And Security Measures (Chapter 6) Flashcards
CIA
Confidentiality
Integrity
Availability
Confidentiality
The fundamentals security goal of keeping information and communication private and protecting them from unauthorised access
Integrity
The fundamental security goal of ensuring that electronic data is not altered or tampered with
Availability
The fundamental security goal of ensuring that systems operate continuously and that authorized individuals can access data that they need
Hardening
A security technique in which the default configuration of a system is altered to protect the system against attacks
Security Policies
Covering all aspects of computer and network hardware from the purchase to disposal/change.
Security Controls
A technology or procedure to mitigate vulnerability and risk, and to ensure CIA of information
Logical security
Controls implemented in software to create an access control system (Firewall)
ACL
Access Control List
- Any scenario where a objects on a list are given access or denied
- NTFS permission
- Share permission
- Firewall
Triple A (AAA)
Authentication
Authorization
Accounting
Authentication
A means for a user to prove their identity to a computer system
Authorization
The process of determining what rights and privileges a particular entity has
Accounting
The process of tracking and recording system activities and resource access.
Aka auditing
Security Control Types
Physical Controls
- physical aspects
Procedural Controls
- procedure that needs to be followed
Logical Controls
- software implemented control
Legal, Regulatory, Compliance Control
- controls that need to be followed by law
Implicit Deny
Unless something has explicitly been granted access it should be denied access
Least Privilege
Something should be allocated the minimum necessary rights, privileges or information needed to perform it’s role
Encryption
Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it’s deciphered.
- takes processing time to encrypted and decrypt data
Symmetric Encryption
- 1024-bit key encryption
- Single key used to encrypted and decrypt
- Copy of keys used to encrypted and decrypt need to be securely distributed and stored
- Faster and less intensive than asymptomatic encryption
Asymmetric Encryption
- Private key to Decrypt
- Public key to Encrypt
- often used for digital signatures, digital certificate and key exchange
- Uses RSA Cipher
Key Exchange
Two host need to know the same symmetric Encryption key without any other host finding out the key.
RSA Cipher
The first successful algorithm to be designed for public key encryption
Cryptographic Encryption
-A hashed value from which it is impossible to recover the original data.
- A one way cryptographic process
- Provides integrity function in most systems
Hash
The value that results from hashing encryption as a short representation of data
PKI
Public Key Infrastructure
Asymmetric Encryption for securekey distribution for symmetric Encryption
Certificate Authority
A server that control the distribution of digital certificate and the associated public/private key pairs
Digital certificate
- X.509 Certificate
- a guarantee that a key belongs to a given system
Execution Control (Hardening)
Logical security technologies designed to prevent malicious software from running on a host and establish a security system that does not entirely depend on the good behaviour of individual uswrs
Anti-Virus
Uses a database of know patterns (definitions and signature) to detect and prevents malware from executing
Heuristic
Monitoring technique that allows dynamic pattern matching based on past experience rather than relying on pre-loaded signatures