Information Security I Exam

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:09 PM on 3/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

64 Terms

1
New cards

information security

protection of information and information systems from unauthorized access, use, disclosure, and disruption, modification, or destruction in order to provide confidentiality, integrity, and access

2
New cards

confidentiality

assures that confidential information is not disclosed to unauthorized individuals

3
New cards

integrity

assures that information and programs are changed only in a specified and authorized manner. involves maintaining consistency, accuracy, and trustworthiness of data

4
New cards

accessibility

assures systems work promptly and service is not denied to users

5
New cards

data confidentiality

private or confidential information is not made available or disclosed to unauthorized individuals

6
New cards

privacy

an individual’s control or influence over what information is related to them may be collected and stored, and by whom and to whom that information may be disclosed

7
New cards

risk

expectation of loss as the probability that a threat will exploit a vulnerability with a harmful result

8
New cards

threat

a potential for violation of security, capability, action, or event that could breach security and cause harm

9
New cards

passive attack

attempts to learn or make use of information from system but does not affect system

10
New cards

active attacker

attempts to alter system resources or affect their operation

11
New cards

cryptographic tools

  1. symmetric encryption

  2. secure hash functions in message authentication

  3. public key (asymmetric encryption)

12
New cards

data encryption standard (DES)

most widely used encryption scheme

64-bit plaintext block

56-bit key

64-bit ciphertext block

13
New cards

triple DES

repeats DES 3 times

uses 2 or 3 unique keys for a key size of 112 or 158 bits

14
New cards

advanced encryption standard

better replacement for triple DES

128-bit data

128/192/256-bit keys

15
New cards

electronic codebook (ECB)

tells you how to implement encryption method

16
New cards

block ciphers

encrypt full 128-bit blocks

17
New cards

stream ciphers

encrypts data bit-by-bit as a continuous stream

18
New cards

cipher block chaining (CBC)

each ciphertext block depends on all plaintext blocks processed up to that point

initialization vector must be used in 1st block to make each message unique

19
New cards

replay attack

an adversary can capture a valid message and resend the same message to the receiver later whenever it benefits them or damages the system

20
New cards

substitution attack

adversary can remove a message in a sequence without the receiver knowing since receiver does not know what or how many it’s expecting

21
New cards

message authentication code (MAC)

does not rely on encryption

uses MAC algorithm to “encrypt” message and compare for later

22
New cards

cryptographic hash function

accepts a variable-size message M as input and produces a fixed-size message digest h = H(M) as output

uses symmetric key for MAC one-way hash function and symmetric encryption

23
New cards

hash function properties

  1. applied to any size data

  2. H produces a fixed-length output

  3. H(x) is relatively easy to compute for any given X, making hardware and software implementations practical

  4. one-way resistant

  5. weak collision resistance (should be hard to find a different input with same hash)

  6. strong collision resistance (should be hard to find two different inputs of any length that result in same hash)

24
New cards

digital signature

asymmetric encryption and hash function together

25
New cards

RSA (rivest, shamir, adleman) steps

  1. select p, q

  2. calculate n = p x q

  3. calculate ÎŚ(n) = (p-1)(q-1)

  4. select integer e gcd(ÎŚ(n), e) = 1; 1 < e < ÎŚ(n)

  5. calculate d de mod ÎŚ(n) = 1

  6. public key KU = {e, n}

  7. private key KR = {d, n}

26
New cards

user authentication: two steps

identification, verification

27
New cards

access control

constraints on what a user can do directly, as well as what programs executing on behalf of the users are allowed to do

28
New cards

object

access controlled resource

29
New cards

subject

entity that can access objects

30
New cards

access right

way in which subject accessed an object

31
New cards

discretionary based access control (DBAC)

user-oriented security policy (based on identity of requester)

entity has rights to grant another entity access to a resource

32
New cards

mandatory access control (MAC)

access permissions defined by system itself

cleared entity cannot pass on access rights to another entity

33
New cards

role based access control (RBAC)

based on roles that users have within system and on rules stating what accesses are allowed to users in given roles

34
New cards

attribute-based access control (ABAC)

controls access based on attributes of user, resource, and current environmental conditions

35
New cards

intrusion

a security event, or multiple security events, in which an intruder gains, or attempts to gain access to a system without having authorization to do so

36
New cards

intrusion detection system (IDS)

security service that monitors/ analyzes system events for the purpose of finding, and providing real-time warning of attempts to access system resources in an unauthorized manner

37
New cards

sensors

collect real-time data about various systems and network functions

38
New cards

anamoly detection

involves collection of data relating to behavior of legitimate users

current behavior is observed and analyzed to determine if behavior is intruder or legitimate user

39
New cards

signature/ heuristics deteciton

uses a set of known malicious data patterns or attack rules that are compared with current behavior

can only identify known attacks that has patterns or rules

40
New cards

model of normality

describe normal system behavior

41
New cards

profile

a set of observed measures of behavior

42
New cards

host-based IDS

applies specialized layer of security software to vulnerable and sensitive systems

can use an anomaly or signature approaches

monitors activity to detect suspicious behavior

covers limited IP space (e.g. my laptop and it’s system call traces, audit records, file checksums)

43
New cards

netowork-based IDS

deploying sensors at strategic locations (before switches/ routers and after host devices, also before external firewall)

inspecting network traffic

monitoring user activities

can be defeated by encryption

44
New cards

honeypot

decoy system design to lure attack away from critical systems, collect information about attacker, encourage attacker to stay long enough that admins can respond

45
New cards

snort

open-source IDS that’s now developed by CISCO

performs real-time packet capture, protocol analysis, and content searching and matching

46
New cards

measure of IDS

proper detection attacks and absence of false alarms

47
New cards

TPR

indicates intrusions

48
New cards

FPR

indicates non-intrusions

49
New cards

bayesian decision rate

knowt flashcard image
50
New cards

firewall

combination of hardware and software that isolates an organization’s internal network from the internet at large, allowing some packets to pass and blocking others

51
New cards

firewall filter characteristics

IP address (limits access to specific services)

application protocol (monitors information exchange)

user identity (inside users using authentication technology)

network activity (controls access based on time, req, rate of req, activity patterns)

52
New cards

application proxy (application-level gateway)

acts as a relay of application-level traffic

53
New cards

economy of mechanism

design of security measures should be as simple and small as possible

54
New cards

fail-safe default

access decisions should be based on permissions rather than exclusions (e.g. blacklist)

55
New cards

complete mediation

every access must be compared with access control mechanicsm

56
New cards

open design

design of security mechanism should be open to the public rather than secret

57
New cards

least privilege

every process and every user of system should operate using the least set of privileges neccessary to perform the task

58
New cards

least common mechanism

design should minimize the functions shared amongst different users, providing mutual security

59
New cards

psychology acceptability

security mechanisms should not interfere with the work of the users but shall simultaneously meet the needs of those who authorize access

60
New cards

isolation

  1. public access systems shall be isolated from critical resources to prevent disclosure or tampering

  2. process and files of indvidual users shall be isolated from one another

  3. security mechanisms should be isolated in the sense of preventing access to mechanism by unauthorized user

61
New cards

encapsulation

specific form of isolation based on object-oriented functionality

collection of proceudres and data objects

62
New cards

modularity

security functions shall be developed separately and separated modules

63
New cards

layering

use of multiple, overlapping protection approaches addressing people, technology, and operational aspects of information systems

64
New cards

least astonishment

programs or user interface shall always respond in a way that is least likely to astonish (surpise) the user. should be intuitive and users can have a good understanding

Explore top flashcards

flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)
flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)