Chapter 1 Flashcards

1
Q

Protection afforded to an automated info system in order to preserve CIA

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Confidentiality - data con..
- privacy
Integrity - data int..
- system int..
Availability - system works and not denied to authorized users
A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Low: loss could be expected to have a limited effect
Moderate: loss could have serious adverse effect
High: loss = sever or catastrophic

A

Levels of Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware
Software
Data
Communication facilities/networks

A

Assets of a Computer System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attempt to alter system resources/affect their operation

A

Active Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attempt to learn/make use of information from the system that does not affect system resources

A

Passive Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Corrupted (loss of integrity)
Leaky (loss of confidentiality)
Unavailable or very slow (loss of availability)

A

Categories of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Capable of exploiting vulnerabilities

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Initiated by an entity inside security parameter

A

Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Initiated from outside perimeter

A

Outsider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any means taken to deal with a security attack

A

Countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Threat Action (Attack):
Exposure
Interception
Inference
Intrusion
A

Threat Consequence:

Unauthorized Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Action (Attack):
Masquerade
Falsification
Repudiation

A

Threat Consequence:

Deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Action (Attack):
Incapacitation
Corruption
Obstruction

A

Threat Consequence:

Disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat Action (Attack):
Misappropriation
Misuse

A

Threat Consequence:

Usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Eavesdropping, monitoring of transmissions

A

Passive Attack

17
Q

Involve some modificaton of data stream

A

Active Attack

18
Q

Consist of reachable and exploitable vulerabilities in a system

A

Attack Surfaces

19
Q

Network _ _ - vulnerabilities denial-of-service attack, disruption of communication links
Software - v.. in apps, OS code
Human - v.. created by personnel

A

Attack Surface Categories

20
Q

Security policy
Security implementation
Assurance
Evaluation

A

Computer Security Strategy