SEC+ Flashcards

Sec+  

27 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Confidentiality refers to
The idea that information should only be accessible to its intended recipients
Integrity is
The idea that information should arrive at a destination as it was sent.
Availability refers to
the idea that information should be available to those authorized to use
Which of the following are components of CIA
Confidentiality, Integrity, Availability
A user encrypts an email before sending it. The only person that can decrypt the email is the recipient. By encrypting the email in this way, the user is attempting to preserve the
Confidentiality of the information
Types of Access Control Factors
Type I: What you know (password, pin) Type II: What you have (keycard, key) Type III: What you are (fingerprint, retina scan)
what is multi-factor authentication
using more than one factor (Type) to ensure a user’s identity
Three steps to any access control process
1. Identification: Who is the user? 2. Authentication: Is the user who he says he is? 3. Authorization: What does the user have permission to do?
MAC: Mandatory Access Control is
The system in which a central administrator or administration dictates all of the access to information in a network or system.
DAC: Discretionary Access Control is
The system in which the owners of files actually determine who gets access to the information.
RBAC: Role-Based Access Control is
Related to a system in which the roles of users determine their access to files. For example, if Bob is a member of accounting, he should not be able to access the engineering files.
Kerberos is
an open-source and widely-accepted method of authentication that works on a shared secret key system with a trusted third party
Name a Kerberos vulnerability
One is that Kerberos makes extensive use of that trusted third party. If the third party is compromised, information confidentiality and integrity may be breached. If the third party simply fails, availability is lost.
The most common form of authentication system is
a username and password system.
Kerberos is associated with _______ technology
SSO (single sign on)