Chapter 1 Flashcards
Assets
Hardware, software, data
Vulnerability
A weakness in the system that allows harm to occur
Threat
A set of circumstances that has the potential to cause loss or harm
Controls
Prevents threats from exercising vulnerabilities. Also known as a countermeasure. Examples are action, device, procedure or technique
CIA/security triad
Availability - only used by authorised parties
Integrity - only modified by authorised parties
Confidentiality - only viewed by authorised parties
Additionally:
authentication - the ability of the system to confirm the identity of the sender
non-repudiation/accountability - to confirm that the sender cannot deny having sent something
Harm
Interception
Interruption
Modification
Fabrication
Failure of confidentiality
Unauthorised access to data by a person or program
Unauthorised access to an approximate data value
Unauthorised learning of the existence of data
Subject
Who
Object
What
Mode of access
How
Policy
who+what+how = yes/no
Preservation of integrity
precise accurate unmodified modified (correct way, authorised people, authorised process) consistent internally consistent meaningful and usable
3 aspects of integrity
authorised actions, separation and protection of resources
error detection
correction
Availability
Applies to data and services. Definition: Timely response to requests Fair resource allocation Concurrency is controlled Fault tolerant The service/system can be easily used
Advanced persistent threat
Organised, financed and patient assailants