ITE 476 Exam 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

59 Terms

1
New cards

Information Assurance

The protection of information, regardless of location, as it pertains to confidentiality, integrity, availability, authentication and non-repudiation

2
New cards

Confidentiality

The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.

3
New cards

Integrity

The assurance that the data is trustworthy and accurate. Maintaining and assuring the accuracy and completeness of data over its entire life-cycle.

4
New cards

Availability

A guarantee of reliable access to information by authorized users.

5
New cards

Asset

Anything within an environment that should be protected.

6
New cards

Threat

A person or thing that is likely to lead to interruption, meddling, or destruction of an asset.

7
New cards

Transitive Liability

You can be responsible for something your server does even if you did not configure it to do it.

8
New cards

Threat Agent

A person/thing that is likely to lead to interruption, meddling, or destruction of an asset.

9
New cards

Authentication

The act of verifying a claim of identity. Asserting/identifying that this is who I am by providing credentials.

10
New cards

Identification

Assertion of who someone is or what something is.

11
New cards

Authorization

The permissions/rights you have been granted based on least privilege.

12
New cards

Non-repudiiation

A state of affairs where the purported maker of a statement will not able to successfully challenge the validity of the statement.

13
New cards

Limiting

Limiting access and vulnerability footprint (only give necessary access, no more).

14
New cards

Layering

Providing layered access, such as more than 1 piece of security.

15
New cards

Obscurity

The act of not making anything obvious, or making it look like something it is not.

16
New cards

Diversity

Reducing mass attacks that rely on predictable behavior by not using identical software.

17
New cards

Hardware

The collection of physical parts of a computer system to be protected.

18
New cards

Software

The programs needed to accomplish the input, processing, output, storage, and control of activities in information systems.

19
New cards

Communications

The act of conveying intended meanings from one entity or group to another through the use of mutually understood signs and semiotic rules.

20
New cards

Products (Physical Security)

Physical security products, such as protective barriers, locks, UPS, and appliances.

21
New cards

People (Personal Security)

Personal security, such as training.

22
New cards

Procedures (Organizational Security)

A document that defines how to implement one or several activities of a process. Defines the sequence of steps.

23
New cards

Simplicity

Systems that are balanced between security and ease of use.

24
New cards

Vulnerability

A weakness in an asset or the absence/weakness of a safeguard/countermeasure that could allow an attacker to compromise CIA of an asset.

25
New cards

Risk

The possibility that something could happen to damage, destroy, or disclose data or other resources.

26
New cards

Stateful Inspection Firewall

A firewall that tracks the operating state and characteristics of network connections traversing the firewall. It drops all packets which are not associated with an existing connection that is recorded in its state table, preventing unsolicited connections with the protected machine. It does not allow unsolicited SYN-ACK from the 3-way handshake.

27
New cards

Network

Packet filtering happens on the _______ layer of the TCP/IP stack.

28
New cards

Transport

Stateful packet inspection is performed in the _______ layer of the TCP/IP stack.

29
New cards

Integrity

Ensuring that data cannot be modified in an unauthorized or undetected manner is a measure of ________.

30
New cards

Accuracy

_______ is measured as the closeness of a measured value to a known value.

31
New cards

Precision

_______ is measured as closeness of multiple measurements to each other.

32
New cards

Layering

________ is one of the fundamental security principles that uses more than one security measure to gain access to an asset.

33
New cards

Obscurity

_______ is one of the fundamental security principles that uses a modification to make something look like something it is not.

34
New cards

Unsolicited SYN/ACK

Stateful inspection firewalls are designed to prevent ________ _________.

35
New cards

Flags

State is determined by inspecting the _________ section of the TCP segment header.

36
New cards

business secrets

email

confidential information

patented processes

Give an example of an asset that needs protection.

37
New cards

Input Chain

used to control behavior for incoming connections. For example, if a user attempts to SSH into your PC/server, iptables will attempt to match the IP address and port to a rule in the input chain.

38
New cards

Forward Chain

used for incoming connections that aren't being delivered to the firewall itself but are forwarded through the firewall to another machine. In this case, the firewall is acting as a router between networks. For example, if a user attempts to SSH to a computer that is on the other side of the firewall, the packets are checked against the rules of the Forward chain and either allowed to go forward or dropped.

39
New cards

Output Chain

is used for outgoing connections. For example, if you try to ping a computer, iptables will check its output chain to see what the rules are regarding this ping before making a decision to allow or deny the connection attempt.

40
New cards

ip tables -L

List rules

41
New cards

iptables -L --line-numbers

List rules with rule numbers

42
New cards

iptables -P INPUT DROP

iptables -P FORWARD DROP

iptables -P OUTPUT DROP

Set default policies

43
New cards

iptables -F

Flush all rules

44
New cards

iptables-save > filename

Save rules

45
New cards

iptables-restore < filename

Restore rules

46
New cards

iptables -I

Insert rule top of list

47
New cards

iptables -A

Append rule to bottom of list

48
New cards

iptables -D [chain] [line-number]

Delete rule

49
New cards

iptables -R

Replace rule

50
New cards

ACCEPT

Allows the packet to successfully move on to its destination or another chain.

51
New cards

DROP

Drops the packet without responding to the requester. The system that sent the packet is not notified of the failure.

52
New cards

REJECT

Sends an error packet back to the remote system and drops the packet.

53
New cards

QUEUE

The packet is queued for handling by a user-space application.

54
New cards

RETURN

Stops checking the packet against rules in the current chain.

55
New cards

LOG

Logs all packets that match this rule.

56
New cards

NEW, N

Indicates a freshly initiated connection through which data has not yet passed back and forth.

57
New cards

ESTABLISHED, E

Indicates an existing connection that is in the process of transferring data.

58
New cards

RELATED

Indicates a connection that is used to facilitate another connection.

59
New cards

INVALID

Indicates connections that has problems in processing packets.