CH13 Flashcards
Security Engineering
The three security levels include _________ security, ______ security, and __________ security.
Infrastructure, Application, Operational.
Name the security level:
which is concerned with maintaining the security of all systems and networks that provide an infrastructure and a set of shared services to the organization.
Infrastructure security
Name the security level:
which is concerned with the security of individual application systems or related groups of systems.
Application security
Name the security level:
which is concerned with the secure operation and use of the organization’s systems.
Operational security
Application security is a software engineering problem where the system is _________ to resist attacks.
designed
Infrastructure security is a systems management problem where the infrastructure is ________ to resist attacks.
configured
___________ is the tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data.
Security engineering
What are the 3 security dimensions?
- Confidentiality
- Integrity
- Availability
Name the security dimension:
Access to a system or its data that is normally available may not be possible.
Availability
Name the security dimension:
Information in a system may be disclosed or made accessible to people or programs that are not authorized to have access to that information.
Confidentiality
Name the security dimension:
Information in a system may be damaged or corrupted making it unusual or unreliable.
Integrity
T/F: Application Security is primarily a human and social issue, concerned with ensuring the people do not take actions that may compromise system security.
F, Operational Security not application security
The ________ of a system is a system property that reflects the system’s ability to protect itself from accidental or deliberate external attack.
security
Security is essential as most systems are networked so that external access to the system through _________ is possible.
the Internet
________ is an essential pre-requisite for availability, reliability and safety.
Security