Ch. 1 - Vocab Flashcards
attack surface
reachable and exploitable vulnerabilities in a system
active attack
an attempt to alter system resources or affect their operation
disruption
interrupts or prevents correct operation of system services, consists of incapacitation, corruption, and obstruction
exposure
direct release of sensitive information
falsification
altering valid data or introducing false data
attack
threat that is carried out
interception
receiving communications intended for another device
intrusion
adversary gaining unauthorized access to sensitive data by overcoming system’s access control protections
authentication
verifying that users are who they say they are
misappropriation
a theft of service
availability
assure systems work promptly and service is not denied to authorized users
complete mediation
every access must be checked against the access control mechanism
confidentiality
preserving restrictions on information access and disclosure
unauthorized disclosure
event where entity gains unauthorized access to data
countermeasure
any means taken to deal with a security attack
data confidentiality
sensitive data is not disclosed to unauthorized individuals
data integrity
data is changed only in an authorized manner
economy of mechanism
hardware and software should be as simple and small as possible
encapsulation
internal structure of an object is accessible only to the procedures of a protected subsystem
fail-safe defaults
default situation is lack of access
falsification
altering valid data or introducing false data
inside attack
initialized by an entity inside the security perimeter, authorized to access system resources, but using them in a way not approved