Ch. 1 - Vocab Flashcards

1
Q

attack surface

A

reachable and exploitable vulnerabilities in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

active attack

A

an attempt to alter system resources or affect their operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

disruption

A

interrupts or prevents correct operation of system services, consists of incapacitation, corruption, and obstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

exposure

A

direct release of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

falsification

A

altering valid data or introducing false data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attack

A

threat that is carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

interception

A

receiving communications intended for another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

intrusion

A

adversary gaining unauthorized access to sensitive data by overcoming system’s access control protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authentication

A

verifying that users are who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

misappropriation

A

a theft of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

availability

A

assure systems work promptly and service is not denied to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

complete mediation

A

every access must be checked against the access control mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

confidentiality

A

preserving restrictions on information access and disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unauthorized disclosure

A

event where entity gains unauthorized access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

countermeasure

A

any means taken to deal with a security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data confidentiality

A

sensitive data is not disclosed to unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data integrity

A

data is changed only in an authorized manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

economy of mechanism

A

hardware and software should be as simple and small as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

encapsulation

A

internal structure of an object is accessible only to the procedures of a protected subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

fail-safe defaults

A

default situation is lack of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

falsification

A

altering valid data or introducing false data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

inside attack

A

initialized by an entity inside the security perimeter, authorized to access system resources, but using them in a way not approved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

isolation

A
  • public access systems should be isolated from critical resources
  • processes should be isolated from one another
  • security mechanism should be isolated
24
Q

layering

A

use of multiple, overlapping protection approaches, to prevent breaches from failures of individual approaches

25
Q

least astonishment

A

user interface should always respond in a way that is least likely to astonish the user

26
Q

least common mechanism

A

minimize the functions shared by different users

27
Q

least privilege

A

every process/user of the system should operate using the minimum amount of privileges necessary to perform the task

28
Q

modularity

A

development of security functions as separate protected modules, and use of modular architecture for mechanism design

29
Q

open design

A

design of a security mechanism should be open rather than secret

30
Q

integrity

A

guarding against improper information modification or destruction

31
Q

passive attack

A

an attempt to learn from the system that does not affect system resources

32
Q

prevent

A

create a situation where an attack does not happen in the first place

33
Q

psychological acceptability

A

security mechanisms should not interfere with the work of users

34
Q

replay

A

passive capture of a data unit and its subsequent retransmission to produce unauthorized effect

35
Q

separation of privilege

A

multiple privilege attributes are required to achieve access to a restricted resource

36
Q

system integrity

A

system performs its intended function in an unimpaired manner

37
Q

traffic analysis

A

observing the pattern of messages, taking note of the location and identity of the communicating hosts and observing the frequency and length of messages

38
Q

privacy

A

individuals control what information related to them may be collected

39
Q

deception

A

where an authorized entity receives false data and believes it to be true, consists of masquerades, falsification, and repudiation

40
Q

access control

A

limit information system access to authorized users, and the types of transactions that authorized users are permitted to exercise

41
Q

adversary (threat agent)

A

entity that conducts detrimental activities

42
Q

asset

A

system resource which users/owners wish to protect

43
Q

assurance

A

having the confidence that the system operates such that the system’s security policy is enforced

44
Q

attack tree

A

branching, hierarchical data structure that represents a set of potential techniques for exploiting security vulnerabilities

45
Q

corruption

A

system resources are made to operate in an unintended manner

46
Q

denial of service

A

inhibits the normal use of communication facilities

47
Q

evaluation

A

process of examining a computer product or system with respect to certain criteria

48
Q

incapacitation

A

a means of disabling a system or its services

49
Q

inference

A

entity indirectly accesses sensitive data by reasoning from characteristics

50
Q

masquerade

A

attempt by unauthorized user to gain access to a system by posing as an authorized user

51
Q

misuse

A

cause system component to perform a service that is detrimental to system security

52
Q

obstruction

A

interrupts delivery of system services

53
Q

repudiation

A

user denies sending/receiving data

54
Q

outside attack

A

initiated from outside the perimeter, by an unauthorized user of the system

55
Q

risk

A

extent to which an entity is threatened by potential circumstance, a function of impact and likelihood

56
Q

usurpation

A

event that results in unauthorized control of system services

57
Q

vulnerabilities

A

weakness that can be exploited by a threat source