P1L1: Security Mindset Flashcards

1
Q

What is of value that you are trying to protect from attackers?

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 kinds of companies?

A
  1. Companies that have been hacked and know it

2. Companies that have been hacked and DON’T know it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What threat sources are there to worry about?

A

Cyber criminals
Hacktivists
Nation States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are the vulnerabilities?

A

software
networks
humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the C.I.A. in the CIA model?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber attacks can have ________ consequences?

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should the good guys do in a security conscious world?

A
Prevention
Detection
Response
Recovery and remediation
policy vs mechanism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does one go about reducing vulnerabilities?

A

Economy of mechanism–keep systems small and simple

Fail-safe defaults–means default access is denied

Complete mediation–no one should be able to bypass security measures

Open design–no secrecy

Least privilege–minimum level of access needed

Psychological acceptability–don’t expect people to do what is inconvenient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Economy of mechanism?

A

Keep systems small and simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fail-safe defaults means what?

A

means default access is denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wat is Complete Mediation?

A

no one should be able to bypass security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does open design mean?

A

open design–no secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Least privilege?

A

providing the minimum level of access needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Psychological acceptability?

A

don’t expect people to do what is inconvenient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer security is protection of the integrity, availability and confidentiality of information system resources. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system. T/F

A

True

18
Q

The first step in devising security services and mechanisms is to develop a security policy. T/F

A

True

19
Q

_____ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

A

System Integrity

20
Q

A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _____.

A

Vulnerability

21
Q

A(n) _____ is an attempt to learn or make use of information from the system that does not affect system resources.

A

passive attack

22
Q

Masquerade, falsification and repudiation are threat actions that cause _____ threat consequences.

A

deception

23
Q

The _____ prevents or inhibits the normal use or management of communication facilities.

A

denial of service

24
Q

The assurance that data received is exactly as sent by an authorized entity is _____.

A

data integrity

25
Q

Confidentiality, Integrity and Availability form what is often referred to as the _______

A

CIA triad

26
Q

A(n) ______ is a threat that is carried out and, if successful, leads to an undesirable violation of security or threat consequence.

A

attack

27
Q

Misappropriation and misuse are attacks that result in ______ threat consequences.

A

usurpation

28
Q

Release of message contents and traffic analysis are two types of ______ attacks.

A

passive

29
Q

Security implementation involves four complementary courses of action: prevention, detection, response and _____.

A

recovery

30
Q

Cybercriminals

A

Want to profit from sensitive information

31
Q

Hacktivists

A

Don’t like you or something do

32
Q

Nation-states

A

China and North Korea

33
Q

Confidentiality

A

Data confidentiality: private information not disclosed to outsiders

Privacy: Individuals control information related to them

34
Q

Integrity

A

Data integrity: Information only changed in an authorized manner

System integrity: System is performing as intended

35
Q

Availability

A

Service not denied and not slow

36
Q

what is an active attack?

A

attempt to alter resources or affect operation

37
Q

What is a Passive attack?

A

Attempt to learn from system that does not affect resources

38
Q

What is a threat agent?

A

person carrying out attack

39
Q

Deception

A

Masquerade
Falsification: false data deceive an authorized entity
Repudiation: Falsely denying responsibility for an act

40
Q

Disruption

A

Incapacitation: disables system component
Corruption: alters system operation
Obstruction: interrupts delivery of system services

41
Q

Usurpation

A

Misappropriation: Gets unauthorized system resources
Misuse: Cause system to perform function detrimental to security