What is the CIA triad?
Confidentiality
Integrity
Availability
What is the difference between policy and mechanism?
What characterizes an Advanced Persistent Threat (APT)?
Organized Directed Well financed Patient Silent
What are four (4) common types of harm?
Interception, Interruption, Modification, Fabrication
What are the three classes of controls?
What are the three classes of authentication strategies?
What are common attacks on “something you know”?
Dictionary attacks Inferring likely passwords/answers Guessing Defeating concealment Exhaustive or brute-force attack Rainbow tables
What is a rainbow table?
Rainbow Tables are datasets of chains of pre-generated “hash-values” for almost every popular password variant, thus reducing the difficulty of password cracking.
What are the goals of an access policy?
-Check every access
-Enforce least privilege
-Verify acceptable usage
(Access control ensures the prevention of unauthorized use of a resource, including the use of a resource in an unauthorized way.)
What is a potential vulnerability of a static authentication token, and what is an alternative?
Skimming attacks. Alternative is dynamic (time-based) authentication token.
What is Federated Identity Manager (FIM)?
A system that assists in managing identities and providing access to resources across different security domains and/or companies.
What is single sign-on (SSO)?
An authentication process that allows a user to access multiple applications with one set of login credentials.
What is an Access Control security policy?
Defines which users can access resources and with which rights (Who, what, how : Subject, object, attribute right).
For access control, what are “Subjects”?
- users, processes
For access control, what are “Objects”?
What are Access Rights?
What is an Access Control Directory?
What is an Access Control Matrix?
What is an Access Control List?
What is a privilege list?
What is a capability?
What is role-based access control (RBAC)?
What is symmetric encryption?
What is asymmetric encryption?
- The public key can be exposed and use to distribute other keys