1. Administrative control example - ANS-rules, laws, guidelines, approaches, tips
2. Authenticity - ANS-Allows you to say whether you've attributed the facts in query to the
proper proprietor or author.
3. Availability - ANS-The capacity to get entry to our information when we want it.
4. Block vs movement ciphers - ANS-1. Block encrypts a block at a time, stream cipher
encrypts one bit at a time
5. 2.Block is currenlty used
6. three. Block is quicker.
7. 4. Block is higher used for recognize document sizes, cipher is better for unknown
records length or non-stop circulation
8. Confidentiality - ANS-Our potential to defend our information from folks that are not legal
to view it.
9. Define SSL (Secure Sockets Layer) - ANS-protocol used to securing not unusual net site
visitors (Ex: web and electronic mail traffic)
10. Describe 3DES - ANS-1. Uses 3 rounds of DES
11. 2. Is slower Than AES
12. Describe a hash characteristic - ANS-1. Keyless cryptography
13. 2. Uses hash in preference to a key.
14. 3. Converts plaintext into a hash (unique and fixed-duration cost) 4. Generates a unique
price for every message
15. Describe AES - ANS-1. Uses 3 specific ciphers, 128 bit key, 192 bit key, 256 bit key
16.
17. 2. Faster than 3DES
18.
19. 3. Longer than 3DES
20. Describe uneven cryptography - ANS-1. Additionally understand as public key
cryptography
21. 2. Uses public and personal key
22. 3. Public key is used to encrypt data and personal secret is used to decrypt information.
23. Describe Asymmetric-Key Algorithms - ANS-
24. Describe Block cipher - ANS-kind of symmertric cryptography that takes binary digits or
blocks and encrypts it.
25. Describe Casear cipher - ANS-shifting every letter of the message by way of a sure wide
variety of spaces.
26. Describe CIA triad - ANS-Confidentiality, Integrity, Availability- A Security idea in infosec.
27. Describe DAC (DISCRECTIONary access manage) - ANS-The owner of the resource
determines who gets get right of entry to to it and to what tiers. (Under proprietors
discretion)
28. Describe ECC (Elliptic curve cryptography) - ANS-1. Makes use of short keys
, 29. 2. Rapid and green
30. Describe Honeypots - ANS-a gadget which can stumble on, monitor and tamper sports
of an attacker
31.
32. used to trap in attackers
33. describe key trade - ANS-Sharing the important thing among the sender and receiver
34. Describe Parkerian Hexad - ANS-Possession/manipulate, Authenticity, and Utility,
Confidentiality, Integrity, Availability.
35. Describe circulation cipher - ANS-type of symmetric cryptography that encrypts each bit
in the obvious textual content one bit at a time.
36. Describe symmetric cryptography - ANS-1. Unmarried key use
37. 2. Encrypts plaintext and decrypt ciphertext
38. 3.Weakness is prime alternate
39. instance of Deterrence - ANS-clock in time cards, Badge ins to avoid stealing paintings
time.
40. Instance of Mandatory get right of entry to manipulate - ANS-Secret or Top mystery
clearance.
41. Example of Nonrepudiation - ANS-study receipts, digital signatures of files.
42. Example of Role-Based Access Control - ANS-employee having get right of entry to
most effective to finish a certain challenge.
43. Example of symmetric key set of rules - ANS-DES, 3DES, AES
44. examples of (RBAC) attributes - ANS-Subject attribute: "You have to be this tall to
journey this journey";
45.
46. Resource attribute: CAPTCHA
47.
48. Environmental attributes: Business Hours, VPN time limits
49. give an explanation for FISMA (Federal Information Security Management Act) -
ANS-Defines security standards for plenty federal corporations in the U.S.
50.
51. Mandates authorities corporations to defend data structures.
52.
53. Regulates federal departments within the United States.
54. Explain HIPAA - ANS-For organizations that set a fashionable to guard sensitive
healthcare and affected person data
55. Explain Industry compliance - ANS-adherence to policies that aren't mandated with the
aid of law
56. explain Multilevel Access Control - ANS-Access control blended throughout other
models.
57. Explain Nonrepudiation - ANS-no longer being capable of deny an motion due to
evidence that an act has taken place.
58. Provide an explanation for PCI DCS - ANS-An facts security popular used to handle
credit card bills.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Ashley96. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.