click below
click below
Normal Size Small Size show me how
Security Basics
the broad security gimmes
| Question | Answer |
|---|---|
| Confidentiality | prevents the unauthorized disclosure of data |
| Encryption | scrambles data to make it unreadable |
| Access Controls | method of ensuring that only authorized personnel can access data |
| Identification | claiming an identity |
| Authentication | proving an identity |
| Authorization | grant/restrict access to resources |
| Stenography | hiding data within data |
| Obfuscation | make data unclear/difficult to understand. rejected as a method of reliable security |
| Stenography | hiding data in plain sight |
| Integrity | assures that data hasn't been changed |
| Hash | random number created by running an algorithm against data |
| Availability | services are available when needed |
| non-repudiation | the inability to refute validity |
| Risk | the likelihood that an exploit will result in a loss |
| Threat | any circumstance that can compromise CIA |
| Vulnerability | a weakness |
| Kerberos | network authentication mechanism useful against man in the middle with mutual authentication and replay attacks with tickets. unix & AD. |
| New Technology LAN Manager | uses a Message Digest hash algorithm to challenge users and check credentials |
| role-BAC | grants access by placing users in groups based on their assignments. matrix. |
| rule-BAC | grants access by a set of instructions |
| DAC | an object's owner establishes access for any other user. susceptible to trojans. |
| MAC | uses security labels to identify objects and subjects. lattice. |
| ABAC | access control for software based networks |