Week 4: ISO 27000 Security Management Categories Flashcards

1
Q

What is the CIA triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main goal for confidentiality?

A

Information to be kept private and secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main goal for Integrity?

A

Data to not be modified, deleted or added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main goal for Availability?

A

Systems to be available to those whom require it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three added values in the extended security triangle?

A

Authentication
Accountability
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of the general concept, security protocols?

A

Passwords
HTTPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are security protocols used for?

A

They are used to establish trust relationships to link up human users with remote machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are protocols designed under certain assumptions?

A

Protection against all attacks is expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give an example of a log-on protocol.

A

A Log-on protocol into computer systems ASSUMES that user can input password in the right machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do people use protocols?

A

Required to formalise secure communication amongst:
people
companies
computers and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some elements of security protocols

A

Not technical
may be very simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give 2 examples of complexities driven by vulnerabilities.

A

Magnetic strip cards to smartcards
metal to electronic keys to keyless entry to cars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are passwords used for

A

authenticating humans to machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is authentication?

A

: be able to prove the identity of users (who they are)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Authorization?

A

be able to allow/deny access to resources based on authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give some examples of login issues

A

: http/s example, weak/reused password, weak recovery mechanism, lack of two factor authentication, session hijacking

17
Q

What are Access control issues?

A

unauthorized users gaining higher privileges, access to unauthorized resources via different mechanisms

18
Q

What are the 3 types of authentication?

A

Based on something you know
Based on something you have
Based on something you are

19
Q

What is the Information Security Framework Model?

A

Plan-Do-Check-Act (PDCA)