WEEK 8 Flashcards
What is CIA
Core principles of information security
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
Confidentiality in CIA is what
It ensured that data is kept private and only accessible to authorized users
(Encryption and Access Control)
Integrity in CIA is what
Ensures the accuracy and trustworthiness of data
(Make sure package is not opened since it was sent out)
Info is not tampered with
Availability in CIA is what
Ensures that data is accessible when needed
(Ability for an IT system to be up and running without interruption)
Confidentiality concerns are what
Snooping
Eavesdropping
Wiretapping
Dumpster Diving
Social engineering
What is Snooping
Am attempt to gain access to information that you are not authorized to view
(Looking at someone else’s phone to get info )
What is Eavesdropping
Secretly listening to the private convo or communication of others without their consent in order to get info
What is Wiretapping
Connecting a listening device to a telephone or data line to secretly monitor a convo
(Bugged phone)
What is Dumpster Diving
Going through someone’s trash to find info that can be used in an attack
What is Social Engineering
Manipulating, influencing, or deceiving a person in order to gain control over a computer or acquire confidential info
Integrity concerns are what
Man-In-The-Middle Attack
Replay Attck
Impersonating
What is Man-In-The-Middle Attack
Sneaky eavesdropper in the middle of a conversation
(Altering the communication between two parties)
What is a Replay Attack
Involves am attacker recording your password or security token when it is send for authentication and then using it later to impersonate you
What is impersonation
When a person impersonates a trusted entity
Availability concerns are what?
Power Outage
Hardware Failure
Destruction
Service Outage
Denial of Service (DoS)
What is a Power Outage
Sudden lost of electricity
What is Hardware Failure
When hardware breaks down
What is Destruction
Human made incidents or natural disasters
What is Service Outage
No signal on your phone
What is Denial of Service (DoS)
An attack that is used to overwhelms system, network, service with an excessive amount of traffic to the point where it breaks
Best practices to secure devices
Antivirus / Anti-Malware
Host Firewall
Changing passwords
Safe Browsing Practices
Up to date updates
What is Antivirus / Anti-Malware
Software designed to detect, prevent, and remove malicious software from computer, or nerwork
What is Signature-based Detection Antivirus
Relies on a database of known malware signatures
Scans files for signatures
(Unique bits of code or characteristics)
What is Behavioral-based (Heuristic) Detection antivirus
Observes the behaviors of programs in real time
It used Heuristics
(Sets of rules to analiza the actions of software)
What is a Host Firewall
Protects an individual device by monitoring and controlling incoming and outgoing network traffic
What are some thing to do when web browsing
Stick to trusted sites
Keep browsers up to date
Stay on supported browsers
Enable notifications when downloading something
Device use best practices
Software screening
User Account Control (UAC)
Remove unwanted or unused software
What is User Account Control (UAC)
Utility in windows that protect your device from malicious downloads
What is Software Screening
What you analyze the application you are downloading to make sure it’s trustworthy
What are the Expectations of Privacy
Application may still have data that has been kept private
Emails can still be read by authorities at any point
File servers can show your IP and can see content of the file
Instant messaging can be leaked too
Locations from apps can be leaked
What is a policy
A set of rules that dictate what action should be taken under various circumstances
(Acceptable use policy
Non disclose-sure agreement )
What is a Non-Disclosure Agreement (NDA)
Legal contract that tells you what u can and can’t say to who
What is a Procedure
A step-by-step instructions to preform a task
(Standard Operating Procedure)