ITI Study Guide - Exam 3: Security and Privacy

studied byStudied by 724 people
5.0(4)
get a hint
hint

CIA Triad

1 / 34

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

35 Terms

1

CIA Triad

Confidentiality, Integrity, Availability

New cards
2

“Confidentiality” in the CIA Triad

The protection of information from people who are not authorized to view it

New cards
3

“Integrity” in the CIA Triad

Ensuring that information is protected from an unauthorized or unintentional alteration (information stays accurate)

New cards
4

“Availability” in the CIA Triad

Systems and data are accessible by users whenever and wherever they are needed

New cards
5

OSINT

A method of gathering information from public or other open sources

New cards
6

Does the Constitution guarantee a right to privacy?

No; instead, the right of privacy exists in the “penumbras” (zones) created by the Constitution

New cards
7

Griswold v. Connecticut

Court case that addressed the existence of the right to privacy through penumbras

New cards
8

Family Educational Rights and Privacy Act (FERPA)

Students have the right to have control over the disclosure of personally identifiable information from records

New cards
9

System

Information resources of any size or complexity, organized expressly for the collection, processing, use, sharing, dissemination, maintenance, or disposition of data or information

New cards
10

Information (in technical terms)

Facts, ideas, or knowledge as various forms of data that can be communicated between system entities

New cards
11

Information Security

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

New cards
12

Social Engineering

Any act that influences a person to take an action that may or may not be in his or her best interests

New cards
13

What is a common example of social engineering?

TV commercials

New cards
14

Hacktivism

The use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change

New cards
15

Guerilla Open Access Manifesto

Written by Aaron Swartz to protest limited access to archives —> suggested the idea of making copies of information and sharing them with others

New cards
16

DNS

Domain Name Server

New cards
17

DNS Resolver

Phonebook of the Internet

New cards
18

IP or IP address

An identifier for a device on a network

New cards
19

How does DNS work?

  1. When you enter a website into your browser, the computer searches its cache memory for the IP address.

  2. If it can’t find it, it sends the request to the DNS, who looks for the IP address in its cache memory.

  3. If the DNS can’t find it, it sends the request to the root server.

  4. If the root server can’t find it, it sends the request to the TLD server.

  5. If the TLD server can’t find it, it sends the request to the authoritative name server.

  6. If the IP address is found, it is sent back to the DNS, which sends it to the computer.

New cards
20

Encryption

The process of making information unreadable

New cards
21

Decryption

The process of making information readable (usually with a key)

New cards
22

Data at rest

Information that is stored somewhere

New cards
23

Full-disk encryption

Encrypts all the information stored on a device and protects it with a passphrase or another authentication method

New cards
24

File encryption

Encrypts only specific, individual files on a device

New cards
25

Drive encryption

Encrypts all the data on a specific storage area on a device

New cards
26

Data in transit

Information that is moving over a network from one place to another

New cards
27

Transport-layer encryption / Transport layer security (TLS)

Protects messages as they travel from your device to the app's servers and from the app's servers to the recipient's device, but the messaging service provider can see unencrypted copies of your messages

New cards
28

End-to-end encryption

Protects messages in transit all the way from sender to receiver; the message is encrypted by the original sender and can only be decoded by its final recipient

New cards
29

Examples of data in transit

Sending messages on messaging apps

  • Message moves from your device to recipient's device

Web browsing

  • Data from webpage travels to website's servers to your browser

New cards
30

Examples of TLS

HTTPS

  • Website servers can see the data you enter while on the site

    • This information is unreadable to eavesdroppers on the network

VPN

  • Traffics still travels over ISP's connection, but is encrypted between you and your VPN provider

New cards
31

Caesar Cipher

An old (but nowadays weak) encryption method that involves the shifting of characters a certain number of times

New cards
32

Plaintext

Readable text that is not encrypted

New cards
33

Ciphertext

Unreadable text that is encrypted

New cards
34

Symmetric key encryption

Uses one key for both encrypting and decrypting messages

New cards
35

Asymmetric key encryption / public key encryption

Uses two keys: a public key for encryption and a private key for decryption

  • Anyone can encrypt the message with the public key

  • But only the person with the private key can decrypt messages

New cards

Explore top notes

note Note
studied byStudied by 6 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 31 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 23 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17792 people
Updated ... ago
4.7 Stars(88)

Explore top flashcards

flashcards Flashcard75 terms
studied byStudied by 45 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard93 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard360 terms
studied byStudied by 66 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard56 terms
studied byStudied by 84 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard45 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 25 people
Updated ... ago
5.0 Stars(5)
flashcards Flashcard752 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)