WEEK 8 Flashcards

1
Q

What is CIA

A

Core principles of information security

CONFIDENTIALITY
INTEGRITY
AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality in CIA is what

A

It ensured that data is kept private and only accessible to authorized users

(Encryption and Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity in CIA is what

A

Ensures the accuracy and trustworthiness of data

(Make sure package is not opened since it was sent out)

Info is not tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability in CIA is what

A

Ensures that data is accessible when needed

(Ability for an IT system to be up and running without interruption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality concerns are what

A

Snooping
Eavesdropping
Wiretapping
Dumpster Diving
Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Snooping

A

Am attempt to gain access to information that you are not authorized to view

(Looking at someone else’s phone to get info )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Eavesdropping

A

Secretly listening to the private convo or communication of others without their consent in order to get info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Wiretapping

A

Connecting a listening device to a telephone or data line to secretly monitor a convo

(Bugged phone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Dumpster Diving

A

Going through someone’s trash to find info that can be used in an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Social Engineering

A

Manipulating, influencing, or deceiving a person in order to gain control over a computer or acquire confidential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity concerns are what

A

Man-In-The-Middle Attack
Replay Attck
Impersonating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Man-In-The-Middle Attack

A

Sneaky eavesdropper in the middle of a conversation

(Altering the communication between two parties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Replay Attack

A

Involves am attacker recording your password or security token when it is send for authentication and then using it later to impersonate you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is impersonation

A

When a person impersonates a trusted entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Availability concerns are what?

A

Power Outage
Hardware Failure
Destruction
Service Outage
Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Power Outage

A

Sudden lost of electricity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Hardware Failure

A

When hardware breaks down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Destruction

A

Human made incidents or natural disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Service Outage

A

No signal on your phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Denial of Service (DoS)

A

An attack that is used to overwhelms system, network, service with an excessive amount of traffic to the point where it breaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Best practices to secure devices

A

Antivirus / Anti-Malware
Host Firewall
Changing passwords
Safe Browsing Practices
Up to date updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Antivirus / Anti-Malware

A

Software designed to detect, prevent, and remove malicious software from computer, or nerwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Signature-based Detection Antivirus

A

Relies on a database of known malware signatures
Scans files for signatures
(Unique bits of code or characteristics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Behavioral-based (Heuristic) Detection antivirus

A

Observes the behaviors of programs in real time
It used Heuristics
(Sets of rules to analiza the actions of software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Host Firewall

A

Protects an individual device by monitoring and controlling incoming and outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are some thing to do when web browsing

A

Stick to trusted sites
Keep browsers up to date
Stay on supported browsers

Enable notifications when downloading something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Device use best practices

A

Software screening
User Account Control (UAC)
Remove unwanted or unused software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is User Account Control (UAC)

A

Utility in windows that protect your device from malicious downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Software Screening

A

What you analyze the application you are downloading to make sure it’s trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the Expectations of Privacy

A

Application may still have data that has been kept private

Emails can still be read by authorities at any point

File servers can show your IP and can see content of the file

Instant messaging can be leaked too

Locations from apps can be leaked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a policy

A

A set of rules that dictate what action should be taken under various circumstances
(Acceptable use policy
Non disclose-sure agreement )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a Non-Disclosure Agreement (NDA)

A

Legal contract that tells you what u can and can’t say to who

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a Procedure

A

A step-by-step instructions to preform a task

(Standard Operating Procedure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Standard Operating Procedures (SOP)

A

Detailed written set of procedures that explain how to undertake a particular activity

35
Q

What is confidential Information

A

Data that should not be shared to unauthorized person

(passwords, credit card data, etc..)

36
Q

Ways to protect confidential Information

A

Store it securely
Encryption
Never share it
Good passwords

37
Q

What is Personal Identifiable Information (PII)

A

Any information that can be used to identify an individual

Name
Social Security Number
Date of Birth
Email Address
Phone Number

38
Q

What is Protected Health Information (PHI)

A

Any information about an idividual’s health status.

Medical Records
Healthcare Services

39
Q

What is AAA

A

Authentication
Authorization
Accounting

(Verifies and manages users Identities)

40
Q

What does Authentication mean in AAA

A

Makes sure its you who is trying to log in

41
Q

What does Authorization mean in AAA

A

Determines what you can and can’t do

42
Q

What does Accounting mean in AAA

A

It tracks user activities and logs them

43
Q

What are some ways that Authentication proves its you

A

Something You Know
(password, PIN, security questions)

Something You Have
(Hardware Token, Software Token, One-Time Password)

Something You Are
(Biometrics, Fingerprint, Eye scan, Face scan)

Somewhere You Are
(Certain Location)

44
Q

What is Single-Factor

A

Verifies your identity only using one piece of evidence
(just password or just a finger scan)

45
Q

What is Multi-factor

A

Requires 2 or more authentication practices to verify its you
(password , finger scan, and hardware token )

46
Q

2 Factor Authentication

A

Uses EXACTLY 2 authentication factors to verify its you
(password and mobile code)

47
Q

What is Single Sign-On (SSO)

A

A user authentication service that permits a user to use one set of login credentials like username and password to access MULTIPLE applications

(if you leave then the next time you try to login you will need to authenticate again)

48
Q

What are Permissions

A

The specific right or privileges granted to users or software

49
Q

What are Least Privilege

A

Giving users or systems only the permissions they absolutely need to perform a task or job function and nothing more

50
Q

Role-Based Access Control (RBAC)

A

Only a certain type of department will have access to a certain type of files
(Roles and job titles)
(IT can see those files but others at work cant)

51
Q

Rule-Based Access Control

A

Has rules on how they have permissions

(Example
Rule 1. only get permissions when at work)

52
Q

Mandatory Access Control (MAC)

A

Uses labels and classifications to determine access

53
Q

Discretionary Access Control (DAC)

A

When the owner of the info decides who gets permissions

54
Q

What are Logs

A

Records that provide a chronological account of events in a system
(logins, file accesses, system errors, security breaches)

(digital footprints left behind on a system)
(silent guardians)

55
Q

What us Non-Repudiation

A

A safeguard that guarantees individuals or entities involved in a digital transaction cannot later refute or deny their participation of their actions
(ensuring that they cant say “I DIDNT DO THAT”)
(videos, fingerprint, digital signature, recipe)

56
Q

What are passwords best practices

A

Password length (longer is better)
Must meet complexity (need characters like *&@!$)
Not to reuse the same password
Password expiration date
Password lock out after certain attempts
Avoid using password for all accounts

57
Q

What is Plain Text

A

Normal text that is readable by anyone
(Hasn’t gone trough encryption)

58
Q

What is Cipher Text

A

Encrypted text that is not readable by anyone

59
Q

To make Cipher Text into Plain Text you do what

A

Decryption
(need a specific key to do this)

60
Q

What is Data at Rest

A

Data stored on devices that is not actively being used or transmitted

(files sitting in your HDD)

61
Q

What is File-Level Encryption

A

Encryption on files

62
Q

What is Disk-Level Encryption

A

Encrypts the entire storage device
(Protects everything on your computer)

63
Q

What is Data in transit

A

Data that moves from one point to another
(EMAIL)

64
Q

What do SSL (Secure Socket Layer) and TLS (Transport Layer Security) do?

A

Digital Handshakes agreeing on encryption methods

65
Q

What is a VPN

A

Creates a secure encrypted connection between your device and a remote server
(protected tunnel)

66
Q

What is Business Continuity

A

Proactive approach to ensure that essential business functions persist during and after any unforeseen event
(keep going)

67
Q

What is Fault Tolerance

A

The ability of a system to continue operating without interruption even when one or more of its components fail

68
Q

What is Redundancy

A

Duplication of critical components to increase reliability and prevents system failure
(back up in case something fails)

69
Q

What us Network Redundancy

A

Ensures that data still flows even if a part of a system fails
(More routers to make sure it has a back up)
(Back up route to make sure data still flows)

70
Q

What is Failover

A

The automatic process where in the event of a failure the system switches to a redundant or standby system

(redirect tasks to a redundant server)
(when server fails it will switch to a backup server)

71
Q

What is Power Redundancy

A

Ensures the system is still powered even if the primary power source fails
(Emergency power generator, backup power supply)

72
Q

What is a Uninterruptible Power Supply (UPS)

A

Device that provides immediate and uninterrupted emergency power to connect devices when the main power source is lost
(seamless transition)

73
Q

What is a Generator

A

Device that transforms mechanical energy like gas or diesel or gas into electrical energy
(long term solution)
(brief delay to turn on)

74
Q

What is Data Replication

A

When you copy data from one location to another

75
Q

What is Data Redundancy

A

Making a copy of the original in case something happens to it

76
Q

What is a Redundant Array of Independent Disks (RAID)

A

Technology uses to combine multiple had drives into a single unit to improve data reliability, performance, or both

77
Q

What does RAID 0 offer

A

Does not offer redundancy
(if one fails the whole system fails)
(striping)

78
Q

What does RAID 1 offer

A

Storage is MIRRORED across two disks
(in case one fails it will still function but does not improve performance)

79
Q

What does RAID 5 offer

A

Its kind of like a balance between raid 0 and raid 1
but it has PARITY
(Has redundancy through PARITY)
(Has performance and redundancy)

80
Q

What does RAID 10 offer

A

Merges the mirroring of raid 1 with the striping of raid 0
(Has fast performance and redundancy)

81
Q

What is Disaster Recovery

A

Resorting IT systems after a disaster
(backup or a replicated system)
(priorities)
(Decide when to give back users access to it)

82
Q

What is Backup Considerations

A

File Backups
Critical Data
Database Backups
OS Backups

83
Q

Pros and Cons of On-Site

A

Pro (Faster download and accessibility)
Con (Can get lost in fire, stolen, flood)

84
Q

Pros and Cons of Off-Site

A

Pro (Can access data from anywhere if you have internet, more space)
Con ( Need internet, subscription fee, can get stolen by hackers)