5. Security Flashcards
What is Confidentiality?
prevention of the disclosure of information to
unauthorized individuals or systems
What is Integrity?
maintenance and assurance of the accuracy and consistency of data over its entire life-cycle
What is Availability?
Ensuring timely and readily access to and use of information
What is Authenticity?
making sure data, transactions, communications are genuine
What is Non-Repudiation?
the maker of a statement will not be able to successfully challenge the validity of the statement or contract
What is Enforcement?
Methods like cryptography and access control are ways to enforce
Breaches of Security can be…
- Intentional
- Accidental
- Internal
- External
Parts of the system that can be vulnerable include…
• communications • storage • software (bugs can destroy availability or allow unauthorised access to other software, hardware or data) • hardware (failures)
Name 6 Communications attacks
1- Eavesdropping: obtaining copies without authority
2- Masquerading: - sending and receiving messages using the identity of another person
3- Message tampering - intercepting messages and altering their contents before passing them on
4- Relaying: storing intercepted messages and sending them at a later date
5- Denial of service (DoS): flooding a channel or a specific machine with messages
6- Distributed DoS - TCP SYN attack
What are three reasons why Digital Signatures are good?
- Authentic
- Unforgeable
- Non-repudiable