Information Security Fundamentals

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/62

flashcard set

Earn XP

Description and Tags

Flashcards for reviewing key concepts in information security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

What are the three components of the CIA triad?

Confidentiality, Integrity, and Availability

2
New cards

Which attack type primarily affects confidentiality?

Interception

3
New cards

Which of the following laws protect federal information?

FISMA. FI stands for “federal information”

4
New cards

What is the CIA Triad?

Confidentiality - allowing only those authorized to access the data requested. Integrity - keeping data unaltered in an unauthorized manner and reliable. Availability - the ability for those authorized to access data when needed

5
New cards

What additions does the Parkerian Hexad make to the CIA Triad?

Possession - physical deposition of the media on which the data is stored and Authenticity and Utility

6
New cards

What is Interception?

an attacker has access to data, applications, or environment

7
New cards

What is Interruption?

attacks cause our assets to become unusable or unavailable

8
New cards

What is Modification?

attacks involve tampering with our asset

9
New cards

What is Fabrication?

attacks that create false information

10
New cards

What are the 'Something you are' authentication factors?

fingerprint, Iris, Retina scan

11
New cards

What is Mutual Authentication?

both parties in a transaction to authenticate each other

12
New cards

What does mutual authentication prevent?

man in the middle attacks where the attacker inserts themselves into the traffic flow

13
New cards

What are the steps of the Risk management process?

Identify Asset, Identify Threats, Assess Vulnerabilities, Assess Risk, Mitigate Risk

14
New cards

What are the steps of the Incident response process?

Preparation - the activities that we can perform, in advance of the incident itself, in order to better enable us to handle it. Detection and Analysis (Identification). Containment. Eradication. Recovery. Post-incident activity

15
New cards

What is Authorization?

what the user can access, modify, and delete

16
New cards

What is Least Privilege?

giving the bare minimum level of access it needs to perform its job/functionality

17
New cards

What is an example of network ACL?

filter access rules for incoming and outgoing network transactions, such as Internet Protocol (IP) addresses, Media Access Control (MAC) addresses, and ports.

18
New cards

What are the Access Control Models?

Discretionary (DAC), Mandatory (MAC), Rule-based, Role-based (RBAC), Attribute-based (ABAC)

19
New cards

Why is Accountability important?

making sure that a person is responsible for their actions. It provides us with the means to trace activities in our environment back to their source.

20
New cards

What is Nonrepudiation?

a situation in which sufficient evidence exists as to prevent an individual from successfully denying that he or she has made a statement, or taken an action

21
New cards

What do Intrusion prevention (IPSes) do?

takes actions when malicious events occur

22
New cards

What is Penetration testing?

mimicking, as closely as possible, the techniques an actual attack would use

23
New cards

What is cryptography?

the practice of keeping information secure through the use of codes and ciphers

24
New cards

What is Symmetric cryptography?

encryption that uses a single key to encrypt and decrypt a message (aka the private key cryptography)

25
New cards

What is Keyless cryptography?

a method of encrypting data that does not use a key. Instead, it uses mathematical algorithms to secure the information (hash functions)

26
New cards

What are Block Cipher?

takes a predetermined number of bits, known as a block, in the plaintext message and encrypts that block

27
New cards

What are Stream Cipher?

encrypts each bit in the plaintext message, 1 bit at a time

28
New cards

What are Asymmetric cyrptography?

a public key and a private key. The public key is used to encrypt data sent from the sender to the receiver and is shared with everyone. Private keys are used to decrypt data that arrives at the receiving end and are very carefully guarded by the receive (aka the public key cryptography)

29
New cards

What does a Digital Signature ensure?

ensure that the message was legitimately sent by the expected party, and to prevent the sender from denying that he or she sent the message, known as nonrepudiation

30
New cards

How does Protecting data at rest?

Protecting data at rest - data is at rest when it is on a storage device, Data protection is done by encryption

31
New cards

How does Protecting data in motion?

SSL VPN and TLS are often used to protect information sent over networks and over the Internet

32
New cards

How does Protecting data in use?

data is in use when a user is accessing the data, Hardest to protect, encryption is limited

33
New cards

What is DDOS?

a type of cyber attack where an attacker floods a website or network with so much traffic that it becomes unavailable to legitimate users

34
New cards

What are examples of laws and regulations?

Federal Information Security Modernization Act (FISMA), Family Educational Rights and Priacy Act (FERPA), Health Insurance Rights and Priacy Act (HIPAA), HITECH (Health Information Technology for Economic and Clinical Health), Sarbanes-Oxley Act (SOX), Gramm-Leach-Biley Act (GLBA), Payment Card Industry Data Security Standard (PCI DSS), Childrens’ Online Privacy Protection Act (COPPA)

35
New cards

What is Pretexting?

when we assume the guise of a manager, customer reporter, or even a co-worker’s family member

36
New cards

What is Phishing?

an attack by convincing the potential victim to click on a link in an e-mail, which steals the victim’s personal information and installs viruses

37
New cards

What is Tailgating?

an unauthorized person attempts to enter a secure area by following someone who is authorized

38
New cards

What is Brute Force?

an attack by submitting password attempts until eventually guessed correctly

39
New cards

What is Defense in-depth?

using a variety of security measures that will still achieve a successful defense should one or more of the defensive measures fail

40
New cards

What is RAID?

data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both

41
New cards

What is Intrusion detection system (IDS)?

monitor the networks, hosts, or applications to which they are connected for unauthorized activity

42
New cards

What is Network intrusion detection system (NIDS)?

a type of IDS that attempts to detect malicious network activities—for example, port scans and DoS attacks—by constantly monitoring network traffic.

43
New cards

What is Host Intrusion detection system (HIDS)?

A software-based application that runs on a local host computer that can detect an attack as it occurs.

44
New cards

What is Network segmentation?

dividing a network into multiple smaller networks (subnet)

45
New cards

What is Packet filtering?

a technique used by firewall to allow/block certain types of network traffic based on the IP, port, and protocol being used.

46
New cards

What is Stateful firewall?

keeps track of the connection state and will only allow traffic that is part of a new or already established connection, A firewall that can watch packets and monitor the traffic from a given connection

47
New cards

What is Deep packet inspection?

analyzing the actual content of the traffic that is flowing through them.

48
New cards

What is DMZ?

a layer of protection that separates a device from the rest of a network and used to host public facing services such as websites.

49
New cards

What does anti-threat software do?

installed only at specific points such as servers that interface between the outside environment and the network segment to be protected

50
New cards

What does anti-threat applications do?

applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet

51
New cards

What is OS Hardening?

Remove unnecessary software, Removing or turning off unessential services, Making alternations to common accounts, Applying the principle of least privilege, Applying software updates in a timely manner, Making use of logging and auditing functions

52
New cards

What is Race conditions?

a vulnerability that occurs when multiple processes or multiple threads are accessing and modifying shared resources

53
New cards

What is SQL injections?

a type of cyber attack where an attacker injects malicious code into a website's database through a web form

54
New cards

What is Fuzzers?

a tool that can be used to test the security of a system by sending it unexpected input, The goal of using a fuzzer is to find vulnerabilities or weaknesses in a system by causing it to crash or behave in unexpected ways.

55
New cards

What is Human Intelligence (HUMINT)?

Information gathered from human sources (e.g., interviews, spies).

56
New cards

What is Signals Intelligence (SIGINT)?

Interception of electronic communications and signals.

57
New cards

What is Geospatial Intelligence (GEOINT)?

Analysis of satellite and aerial imagery.

58
New cards

What is Measurement and Signature Intelligence (MASINT)?

Data from sensors detecting weapons, radiation, etc.

59
New cards

What is Open Source Intelligence (OSINT)?

Information from publicly available sources (news, social media).

60
New cards

What is Cyber Intelligence (CYBINT)?

Threats and vulnerabilities in cyberspace.

61
New cards

What is Financial Intelligence (FININT)?

Monitoring financial transactions for fraud, money laundering.

62
New cards

What is Technical Intelligence (TECHINT)?

Data on foreign technology, weapons, and defense systems.

63
New cards

What is ASLR (Address Space Layout Randomization)?

a security technique used to prevent exploitation of memory-based vulnerabilities, such as buffer overflows. It works by randomly positioning key data areas in a program's memory space.