Ch. 1 - Vocab Flashcards

1
Q

attack surface

A

reachable and exploitable vulnerabilities in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

active attack

A

an attempt to alter system resources or affect their operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

disruption

A

interrupts or prevents correct operation of system services, consists of incapacitation, corruption, and obstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

exposure

A

direct release of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

falsification

A

altering valid data or introducing false data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attack

A

threat that is carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

interception

A

receiving communications intended for another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

intrusion

A

adversary gaining unauthorized access to sensitive data by overcoming system’s access control protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authentication

A

verifying that users are who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

misappropriation

A

a theft of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

availability

A

assure systems work promptly and service is not denied to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

complete mediation

A

every access must be checked against the access control mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

confidentiality

A

preserving restrictions on information access and disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unauthorized disclosure

A

event where entity gains unauthorized access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

countermeasure

A

any means taken to deal with a security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data confidentiality

A

sensitive data is not disclosed to unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data integrity

A

data is changed only in an authorized manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

economy of mechanism

A

hardware and software should be as simple and small as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

encapsulation

A

internal structure of an object is accessible only to the procedures of a protected subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

fail-safe defaults

A

default situation is lack of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

falsification

A

altering valid data or introducing false data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

inside attack

A

initialized by an entity inside the security perimeter, authorized to access system resources, but using them in a way not approved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

isolation

A
  • public access systems should be isolated from critical resources
  • processes should be isolated from one another
  • security mechanism should be isolated
24
Q

layering

A

use of multiple, overlapping protection approaches, to prevent breaches from failures of individual approaches

25
least astonishment
user interface should always respond in a way that is least likely to astonish the user
26
least common mechanism
minimize the functions shared by different users
27
least privilege
every process/user of the system should operate using the minimum amount of privileges necessary to perform the task
28
modularity
development of security functions as separate protected modules, and use of modular architecture for mechanism design
29
open design
design of a security mechanism should be open rather than secret
30
integrity
guarding against improper information modification or destruction
31
passive attack
an attempt to learn from the system that does not affect system resources
32
prevent
create a situation where an attack does not happen in the first place
33
psychological acceptability
security mechanisms should not interfere with the work of users
34
replay
passive capture of a data unit and its subsequent retransmission to produce unauthorized effect
35
separation of privilege
multiple privilege attributes are required to achieve access to a restricted resource
36
system integrity
system performs its intended function in an unimpaired manner
37
traffic analysis
observing the pattern of messages, taking note of the location and identity of the communicating hosts and observing the frequency and length of messages
38
privacy
individuals control what information related to them may be collected
39
deception
where an authorized entity receives false data and believes it to be true, consists of masquerades, falsification, and repudiation
40
access control
limit information system access to authorized users, and the types of transactions that authorized users are permitted to exercise
41
adversary (threat agent)
entity that conducts detrimental activities
42
asset
system resource which users/owners wish to protect
43
assurance
having the confidence that the system operates such that the system's security policy is enforced
44
attack tree
branching, hierarchical data structure that represents a set of potential techniques for exploiting security vulnerabilities
45
corruption
system resources are made to operate in an unintended manner
46
denial of service
inhibits the normal use of communication facilities
47
evaluation
process of examining a computer product or system with respect to certain criteria
48
incapacitation
a means of disabling a system or its services
49
inference
entity indirectly accesses sensitive data by reasoning from characteristics
50
masquerade
attempt by unauthorized user to gain access to a system by posing as an authorized user
51
misuse
cause system component to perform a service that is detrimental to system security
52
obstruction
interrupts delivery of system services
53
repudiation
user denies sending/receiving data
54
outside attack
initiated from outside the perimeter, by an unauthorized user of the system
55
risk
extent to which an entity is threatened by potential circumstance, a function of impact and likelihood
56
usurpation
event that results in unauthorized control of system services
57
vulnerabilities
weakness that can be exploited by a threat source