WEEK 8 Flashcards
What is CIA
Core principles of information security
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
Confidentiality in CIA is what
It ensured that data is kept private and only accessible to authorized users
(Encryption and Access Control)
Integrity in CIA is what
Ensures the accuracy and trustworthiness of data
(Make sure package is not opened since it was sent out)
Info is not tampered with
Availability in CIA is what
Ensures that data is accessible when needed
(Ability for an IT system to be up and running without interruption)
Confidentiality concerns are what
Snooping
Eavesdropping
Wiretapping
Dumpster Diving
Social engineering
What is Snooping
Am attempt to gain access to information that you are not authorized to view
(Looking at someone else’s phone to get info )
What is Eavesdropping
Secretly listening to the private convo or communication of others without their consent in order to get info
What is Wiretapping
Connecting a listening device to a telephone or data line to secretly monitor a convo
(Bugged phone)
What is Dumpster Diving
Going through someone’s trash to find info that can be used in an attack
What is Social Engineering
Manipulating, influencing, or deceiving a person in order to gain control over a computer or acquire confidential info
Integrity concerns are what
Man-In-The-Middle Attack
Replay Attck
Impersonating
What is Man-In-The-Middle Attack
Sneaky eavesdropper in the middle of a conversation
(Altering the communication between two parties)
What is a Replay Attack
Involves am attacker recording your password or security token when it is send for authentication and then using it later to impersonate you
What is impersonation
When a person impersonates a trusted entity
Availability concerns are what?
Power Outage
Hardware Failure
Destruction
Service Outage
Denial of Service (DoS)
What is a Power Outage
Sudden lost of electricity
What is Hardware Failure
When hardware breaks down
What is Destruction
Human made incidents or natural disasters
What is Service Outage
No signal on your phone
What is Denial of Service (DoS)
An attack that is used to overwhelms system, network, service with an excessive amount of traffic to the point where it breaks
Best practices to secure devices
Antivirus / Anti-Malware
Host Firewall
Changing passwords
Safe Browsing Practices
Up to date updates
What is Antivirus / Anti-Malware
Software designed to detect, prevent, and remove malicious software from computer, or nerwork
What is Signature-based Detection Antivirus
Relies on a database of known malware signatures
Scans files for signatures
(Unique bits of code or characteristics)
What is Behavioral-based (Heuristic) Detection antivirus
Observes the behaviors of programs in real time
It used Heuristics
(Sets of rules to analiza the actions of software)
What is a Host Firewall
Protects an individual device by monitoring and controlling incoming and outgoing network traffic
What are some thing to do when web browsing
Stick to trusted sites
Keep browsers up to date
Stay on supported browsers
Enable notifications when downloading something
Device use best practices
Software screening
User Account Control (UAC)
Remove unwanted or unused software
What is User Account Control (UAC)
Utility in windows that protect your device from malicious downloads
What is Software Screening
What you analyze the application you are downloading to make sure it’s trustworthy
What are the Expectations of Privacy
Application may still have data that has been kept private
Emails can still be read by authorities at any point
File servers can show your IP and can see content of the file
Instant messaging can be leaked too
Locations from apps can be leaked
What is a policy
A set of rules that dictate what action should be taken under various circumstances
(Acceptable use policy
Non disclose-sure agreement )
What is a Non-Disclosure Agreement (NDA)
Legal contract that tells you what u can and can’t say to who
What is a Procedure
A step-by-step instructions to preform a task
(Standard Operating Procedure)
What is Standard Operating Procedures (SOP)
Detailed written set of procedures that explain how to undertake a particular activity
What is confidential Information
Data that should not be shared to unauthorized person
(passwords, credit card data, etc..)
Ways to protect confidential Information
Store it securely
Encryption
Never share it
Good passwords
What is Personal Identifiable Information (PII)
Any information that can be used to identify an individual
Name
Social Security Number
Date of Birth
Email Address
Phone Number
What is Protected Health Information (PHI)
Any information about an idividual’s health status.
Medical Records
Healthcare Services
What is AAA
Authentication
Authorization
Accounting
(Verifies and manages users Identities)
What does Authentication mean in AAA
Makes sure its you who is trying to log in
What does Authorization mean in AAA
Determines what you can and can’t do
What does Accounting mean in AAA
It tracks user activities and logs them
What are some ways that Authentication proves its you
Something You Know
(password, PIN, security questions)
Something You Have
(Hardware Token, Software Token, One-Time Password)
Something You Are
(Biometrics, Fingerprint, Eye scan, Face scan)
Somewhere You Are
(Certain Location)
What is Single-Factor
Verifies your identity only using one piece of evidence
(just password or just a finger scan)
What is Multi-factor
Requires 2 or more authentication practices to verify its you
(password , finger scan, and hardware token )
2 Factor Authentication
Uses EXACTLY 2 authentication factors to verify its you
(password and mobile code)
What is Single Sign-On (SSO)
A user authentication service that permits a user to use one set of login credentials like username and password to access MULTIPLE applications
(if you leave then the next time you try to login you will need to authenticate again)
What are Permissions
The specific right or privileges granted to users or software
What are Least Privilege
Giving users or systems only the permissions they absolutely need to perform a task or job function and nothing more
Role-Based Access Control (RBAC)
Only a certain type of department will have access to a certain type of files
(Roles and job titles)
(IT can see those files but others at work cant)
Rule-Based Access Control
Has rules on how they have permissions
(Example
Rule 1. only get permissions when at work)
Mandatory Access Control (MAC)
Uses labels and classifications to determine access
Discretionary Access Control (DAC)
When the owner of the info decides who gets permissions
What are Logs
Records that provide a chronological account of events in a system
(logins, file accesses, system errors, security breaches)
(digital footprints left behind on a system)
(silent guardians)
What us Non-Repudiation
A safeguard that guarantees individuals or entities involved in a digital transaction cannot later refute or deny their participation of their actions
(ensuring that they cant say “I DIDNT DO THAT”)
(videos, fingerprint, digital signature, recipe)
What are passwords best practices
Password length (longer is better)
Must meet complexity (need characters like *&@!$)
Not to reuse the same password
Password expiration date
Password lock out after certain attempts
Avoid using password for all accounts
What is Plain Text
Normal text that is readable by anyone
(Hasn’t gone trough encryption)
What is Cipher Text
Encrypted text that is not readable by anyone
To make Cipher Text into Plain Text you do what
Decryption
(need a specific key to do this)
What is Data at Rest
Data stored on devices that is not actively being used or transmitted
(files sitting in your HDD)
What is File-Level Encryption
Encryption on files
What is Disk-Level Encryption
Encrypts the entire storage device
(Protects everything on your computer)
What is Data in transit
Data that moves from one point to another
(EMAIL)
What do SSL (Secure Socket Layer) and TLS (Transport Layer Security) do?
Digital Handshakes agreeing on encryption methods
What is a VPN
Creates a secure encrypted connection between your device and a remote server
(protected tunnel)
What is Business Continuity
Proactive approach to ensure that essential business functions persist during and after any unforeseen event
(keep going)
What is Fault Tolerance
The ability of a system to continue operating without interruption even when one or more of its components fail
What is Redundancy
Duplication of critical components to increase reliability and prevents system failure
(back up in case something fails)
What us Network Redundancy
Ensures that data still flows even if a part of a system fails
(More routers to make sure it has a back up)
(Back up route to make sure data still flows)
What is Failover
The automatic process where in the event of a failure the system switches to a redundant or standby system
(redirect tasks to a redundant server)
(when server fails it will switch to a backup server)
What is Power Redundancy
Ensures the system is still powered even if the primary power source fails
(Emergency power generator, backup power supply)
What is a Uninterruptible Power Supply (UPS)
Device that provides immediate and uninterrupted emergency power to connect devices when the main power source is lost
(seamless transition)
What is a Generator
Device that transforms mechanical energy like gas or diesel or gas into electrical energy
(long term solution)
(brief delay to turn on)
What is Data Replication
When you copy data from one location to another
What is Data Redundancy
Making a copy of the original in case something happens to it
What is a Redundant Array of Independent Disks (RAID)
Technology uses to combine multiple had drives into a single unit to improve data reliability, performance, or both
What does RAID 0 offer
Does not offer redundancy
(if one fails the whole system fails)
(striping)
What does RAID 1 offer
Storage is MIRRORED across two disks
(in case one fails it will still function but does not improve performance)
What does RAID 5 offer
Its kind of like a balance between raid 0 and raid 1
but it has PARITY
(Has redundancy through PARITY)
(Has performance and redundancy)
What does RAID 10 offer
Merges the mirroring of raid 1 with the striping of raid 0
(Has fast performance and redundancy)
What is Disaster Recovery
Resorting IT systems after a disaster
(backup or a replicated system)
(priorities)
(Decide when to give back users access to it)
What is Backup Considerations
File Backups
Critical Data
Database Backups
OS Backups
Pros and Cons of On-Site
Pro (Faster download and accessibility)
Con (Can get lost in fire, stolen, flood)
Pros and Cons of Off-Site
Pro (Can access data from anywhere if you have internet, more space)
Con ( Need internet, subscription fee, can get stolen by hackers)