3. Concepts of Security Flashcards
What are the 4 security attacks?
- Interruption - attack on availability.
- Interception - attack on confidentiality
- Modification - attack on integrity.
- Fabrication - attack on authenticity.
What are the threat consequences?
- Unauthorized disclosure of data.
- Deception
- Disruption
- Usurpation (misuse)
What is a passive attack?
A passive attack is where the perpetrator only listens in to data / communications and does not interupt the normal flow of data / systems.
What is an active attack?
An active attack is an attack where the malicious actor interrupts the normal flow of data / operation of a system.
What are countermeasures?
Countermeasures are any means used to deal with security attacks. Countermeasures may result in new vulnerabilties and the main goal is to minimize risk given constraints.
What is computer security?
Computer security is the protection afforded to an automated system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of computer systems.
What is a security service?
A security service is a service to enhance the security of data processing systems and information transfers of an organization. They are intended to counter security attacks using one or more security mechanisms which often replicates functions normally associaiated with physical documents (such as signatures, dates, etc).
What is the X.800 model?
- Authentication - assurance that communicating entity is the one claimed.
- Access control - prevention of the unauthorized use of a resource
- Data confidentiality - protection of data from unauthorized disclosure.
- Data Integrity - assurance that the data received is as sent by an authorized entity.
- Non-repudiation - protection against denial by one of the parties in a communication.
- Availability - resource accessible / usable.
What methods of defence can be implemented?
- Encryption
- Software controls (access limitations in database etc.)
- Hardware controls (e.g. smartcard)
- Policies (e.g, password changes)
- Physical controls