What are the three core principles of the CIA triad in information security?
Confidentiality, Integrity, and Availability.
In the CIA triad, what does ‘Confidentiality’ refer to?
Information should only be viewed by authorised users.
In the CIA triad, what is the principle of ‘Integrity’?
Information should not be altered without appropriate authorisation.
What does ‘Availability’ mean in the context of the CIA triad?
Information should be available to legitimate users in line with the design of the system.
Define ‘vulnerability’ in the context of cyber security.
A limitation or weakness which opens a system to potential attack.
What is a ‘threat’ in cyber security?
Something or someone that poses potential harm to a system.
What is an ‘attack’ in cyber security?
An event that aims to exploit a vulnerability of a system.
The collection of all entry points an unauthorised attacker could attempt to exploit is known as the _____.
Attack Surface.
What is an ‘Attack Vector’?
The path an attacker has taken to gain unauthorised access to a system.
What are the three main categories of authentication factors?
Knowledge (something you know), Biometrics (something you are), and Token (something you have).
What is required for an authentication method to be considered Multi-Factor Authentication (MFA)?
It must use a combination of authentication from at least two different factor categories.
In the context of access control, what is ‘Identification’?
The act of claiming an identity, for example, stating ‘I am Fred’.
What is the primary goal of an Advanced Persistent Threat (APT)?
To gain stealthy, long-term access to a targeted system for data exfiltration.
What are the five main stages of an Advanced Persistent Threat (APT) campaign?
Reconnaissance, Initial Compromise, Lateral Movement, Data Exfiltration, and Maintenance and Concealment.
In an APT, what occurs during the ‘Lateral Movement’ stage?
The attacker expands their access across the systems, such as compromising additional devices or increasing permissions.
In Unix-based systems, what do the ‘r’, ‘w’, and ‘x’ permissions stand for?
Read (r), write (w), and execute (x).
In the Unix access control model, what are the three user classifications for permissions?
Owner, Group, and World (Other).
What do the permissions ‘rwxrw-r–’ represent in the Unix access control model?
The Owner has read, write, and execute permissions; the Group has read and write permissions; and the World has only read permission.
In biometrics, what is the ‘Enrolment’ stage?
It is the process where a user’s biometric trait is measured and a template is extracted and stored for future comparisons.
What does the False Accept Rate (FAR) measure in a biometric system?
It is a measure of the likelihood of the system incorrectly accepting an access attempt by an unauthorised user.
What does the False Reject Rate (FRR) measure in a biometric system?
It is a measure of the likelihood of the system incorrectly rejecting an access attempt by an authorised user.
What is a Receiver Operating Characteristic (ROC) curve used to illustrate in biometrics?
It plots the True Accept Rate (TAR) against the False Accept Rate (FAR) to show the performance of a biometric system at various threshold settings.
What is a significant drawback of retinal scanning compared to iris recognition?
It is more invasive, can be affected by disease over time, and requires specialist low-light equipment.
What two key metrics are used in keystroke dynamics for behavioural biometrics?
Dwell time (how long a key is pressed) and flight time (the time between key presses).