4. Security Requirements Flashcards

(29 cards)

1
Q

What is the CIA triad in information security?

A

Confidentiality, Integrity, and Availability — the three core security objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality?

A

Preventing unauthorized reading of information; keeping data secret from unauthorized entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is integrity in information security?

A

Ensuring data cannot be altered by unauthorized or unknown means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is availability?

A

Ensuring authorized users can access information and services when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack threatens availability?

A

Denial of Service (DoS) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is availability important for both users and organizations?

A

Users need access to services; organizations lose revenue and trust if systems are unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Denial of Service (DoS)?

A

An attack aimed at reducing or preventing access to information or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is CIA not sufficient alone for security?

A

It does not address identity verification, permissions, or accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is authentication?

A

Verifying the identity of an entity (user, system, device).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is entity authentication?

A

Confirming the identity of a person, computer, or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is message authentication?

A

Verifying the source of information (data origin authentication).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is network authentication difficult?

A

Attackers can intercept, modify, replay, or forge messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is replay attack?

A

Reusing old valid messages to impersonate a legitimate user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What role does cryptography play in authentication?

A

It secures credentials and protects authentication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is authorization?

A

Restricting what an authenticated user is allowed to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does authorization differ from authentication?

A

Authentication verifies identity; authorization controls permissions.

17
Q

What is access control?

A

The combined process of authentication and authorization.

18
Q

What is non-repudiation?

A

Preventing an entity from denying previous actions or commitments.

19
Q

What is a digital signature used for?

A

Binding information to an entity and supporting integrity and non-repudiation.

20
Q

What is certification?

A

Endorsement of information by a trusted entity.

21
Q

What is validation in security objectives?

A

Ensuring authorization is timely and still valid.

22
Q

What is timestamping?

A

Recording the time of creation or existence of information.

23
Q

What is witnessing?

A

Verifying information creation or existence by a third party.

24
Q

What is receipt?

A

Acknowledgement that information has been received.

25
What is confirmation?
Acknowledgement that a service has been provided.
26
What is ownership in information security?
The legal right to use or transfer a resource.
27
What is anonymity?
Concealing the identity of an entity involved in a process.
28
What is revocation?
Withdrawal of authorization or certification.
29
Why is revocation important?
It limits damage when credentials or permissions are compromised.