Chapter 1 Flashcards

1
Q

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).

a. Data Integrity
b. Availability
c. Computer Security
d. Privacy

A

c. Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

a. Data Integrity
b. Data Confidentiality
c. System Integrity
d. Accountability

A

b. Data Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

a. Privacy
b. Integrity
c. Availability
d. Computer Security

A

a. Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Assures that information and programs are changed only in a specified and authorized manner.

a. Availability
b. Privacy
c. Data Integrity
d. Availability

A

c. Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

a. System Integrity
b. Privacy
c. Security Policy
d. Data Confidentiality

A

a. System integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Assures that systems work promptly and service is not denied to authorized users.

a. Computer Security
b. Data Confidentiality
c. Data Integrity
d. Availability

A

d. Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the CIA triad.These are the fundamental security objectives for both data and for information and computing services.

a. Communication, Interception, and Accountability
b. Confidentiality, Integrity, and Availability
c. Confidentiality, Interception, and Accountability
d. Communication, Integrity, and Availability

A

b. Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of ____ is the unauthorized disclosure of information.

a. Data Integrity
b. Confidentiality
c. Availability
d. Communication

A

b. Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. a loss of ____ is the unauthorized modification or destruction of information.

a. Integrity
b. Availability
c. Confidentiality
d. Authenticity

A

a.Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ensuring timely and reliable access to and use of information. A loss of ___ is the disruption of access to or use of information or an information system.

a. Authenticity
b. Integrity
c. Availability
d. Confidentiality

A

c. Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. This means verifying their users are who they say they are and that each input arriving at the system came from a trusted source.

a. Accountability
b. Authenticity
c. Availability

A

b. Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The security tool that generates the requirement for actions of an entity to be traced uniquely to that entity. this supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems aren’t yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.

a. Accountability
b. Availability
c. Authenticity

A

a. Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Including computer systems and other data processing, data storage, and data communications devices

a. Software
b. Hardware
c. Data

A

b. Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Including the operating system, system utilities, and applications.

a. Software
b. Hardware
c. Data

A

a. Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Including files and databases, as well as security-related data, such as password files.

a. Software
b. Hardware
c. Data

A

c. Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An entity that attacks, or is a threat to, a system

a. Adversary
b. Keylogger
c. Eavesdropping
d. Exploiting

A

a. Adversary (Threat Agent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an assault on system security that derives from an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.

a. Threat
b. Vulnerability
c. Attack
d. Corruption

A

c. Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.

a. Countermeasure
b. Security Policy
c. Interception
d. Vulnerability

A

a. Countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.

a. Attack
b. Misuse
c. obstruction
d. Risk

A

d. Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

a. System Resource
b. Security Policy
c. Denial Of Service

A

b. Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data contained in an information system; or a service provided by a system; or a system capability, such as processing power or communication bandwidth; or an item of system equipment (i.e., a system component - hardware, firmware, software, or documentation); or a facility that houses system operations and equipment.

a. encryption
b. OSI security architecture
c. System Resource
d. Threat

A

c. System Resource (Asset)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A potential for violation of security, which exists when there is a circumstance, capability, action, or event, that could breach security and cause harm. That is, a ___ is a possible danger that might exploit a vulnerability.

a. Threat
b. Attack
c. Risk
d. Corruption

A

a.Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.

a. Corruption
b. Vulnerability
c. Threat
d. System Resource

A

b. Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When the computer system is ______ it does the wrong thing or gives wrong answers. for example, stored data values may differ from what they should be because they have been improperly modified. This is a vulnerability of the system.

a. Leaky
b. Corrupted
c. Unavailable

A

b. Corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A computer system is ____ when someone who should not have access to some or all of the information available through the network obtains such access. This is a Vulnerability of the system

a. Leaky
b. Corrupted
c. Unavailable

A

a. Leaky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Another Vulnerability of a computer system is when it becomes ____. its when using the system or network becomes impossible or impractical.

a. Leaky
b. Corrupted
c. Unavailable

A

c. Unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An attempt to alter system resources or affect their operation.

a. Passive Attack
b. Inside Attack
c. Active Attack
d. Outside Attack

A

c. Active Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An attempt to learn or make use of information from the system that does not affect system resources.

a. Passive Attack
b. Inside Attack
c. Active Attack
d. Outside Attack

A

a. Passive Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Initiated by an entity inside the security perimeter. the ____ is authorized to access system resources but uses them in a way not approved by those who granted the authorization.

a. Passive Attack
b. Inside Attack
c. Active Attack
d. Outside Attack

A

b. Inside Attack

30
Q

Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system. On the internet, potential _____ range from amateur pranksters to organized criminals, international terrorists, and hostile governments.

a. Passive Attack
b. Inside Attack
c. Active Attack
d. Outside Attack

A

d. Outside Attack

31
Q

This results from the threat of unauthorized disclosure. is can be deliberate, as when an insider intentionally releases sensitive information, such as credit card numbers, to an outsider. it can also be the result of a human, hardware, or software error, which results in an entity gaining unauthorized knowledge of sensitive data.

a. Inference
b. Exposure
c. Interception
d. Intrusion

A

b. Exposure

32
Q

This results from the threat of unauthorized disclosure. It is a common attack in the context of communications. On a shared LAN, such as a wireless LAN or a broadcast Ethernet, any device attached to the LAN can receive a copy of packets intended for another device. On the Internet, a determined hacker can gain access to e-mail traffic and other data transfers.

a. Inference
b. Exposure
c. Interception
d. Intrusion

A

c. Interception

33
Q

This results from the threat of unauthorized disclosure. An example of _____ is known as traffic analysis, in which an
adversary is able to gain information from observing the pattern of traffic on
a network, such as the amount of traffic between particular pairs of hosts on
the network. Another example is the ______ of detailed information from
a database by a user who has only limited access; this is accomplished by
repeated queries whose combined results enable inference.
a. Inference
b. Exposure
c. Interception
d. Deception

A

a. Inference

34
Q

This results from the threat of unauthorized disclosure. An unauthorized entity gains access to sensitive data by circumventing a system’s security protections.

a. Inference
b. Exposure
c. Interception
d. Intrusion

A

d. Intrusion

35
Q

an attempt by an unauthorized
user to gain access to a system by posing as an authorized user; this could
happen if the unauthorized user has learned another user’s logon ID and
password. Another example is malicious logic, such as a Trojan horse, that
appears to perform a useful or desirable function but actually gains unauthorized
access to system resources or tricks a user into executing other malicious
logic.
a. Falsification
b. Masquerade
c. Repudiation
d. Intrusion

A

b. Masquerade

36
Q

to the altering or replacing of valid data or the introduction
of false data into a file or database. For example, a student may alter
his or her grades on a school database.
a. Falsification
b. Masquerade
c. Repudiation
d. Intrusion

A

a. Falsification

37
Q

, a user either denies sending data or a user denies
receiving or possessing the data. An entity deceives another by falsely denying responsibility for an act.
a. Falsification
b. Masquerade
c. Repudiation
d. Intrusion

A

c. Repudiation

38
Q

A circumstance or event that may result in an authorized entity receiving false data and believing it to be true.

a. Deception
b. Unauthorized Disclosure
c. Disruption
d. Usurpation

A

a. Deception

39
Q

A circumstance or event whereby an entity gains access to data for which the entity is not authorized.

a. Deception
b. Unauthorized Disclosure
c. Disruption
d. Usurpation

A

b. Unauthorized Disclosure

40
Q

A circumstance or event that interrupts or prevents the correct operation of system services and functions.

a. Deception
b. Unauthorized Disclosure
c. Disruption
d. Usurpation

A

c. Disruption

41
Q

A circumstance or event that results in control of system services or functions by an unauthorized entity.

a. Deception
b. Unauthorized Disclosure
c. Disruption
d. Usurpation

A

d. Usurpation

42
Q

Prevents or interrupts system operation by disabling a system component.

a. Obstruction
b. Corruption
c. Falsification
d. Incapacitation

A

d. Incapacitation
This is an attack on system availability. This could occur as a
result of physical destruction of or damage to system hardware. More typically,
malicious software, such as Trojan horses, viruses, or worms, could operate in
such a way as to disable a system or some of its services.

43
Q

Undesirably alters system operation by adversely modifying system functions or data.

a. Obstruction
b. Corruption
c. Falsification
d. Incapacitation

A

b. Corruption
This is an attack on system integrity. Malicious software in this
context could operate in such a way that system resources or services function
in an unintended manner. Or a user could gain unauthorized access to a system
and modify some of its functions. An example of the latter is a user placing
backdoor logic in the system to provide subsequent access to a system and its
resources by other than the usual procedure.

44
Q

A threat action that interrupts delivery of system services by hindering system operation.

a. Obstruction
b. Corruption
c. Incapacitation

A

a. Obstruction: One way to obstruct system operation is to interfere with communications
by disabling communication links or altering communication
control information. Another way is to overload the system by placing excess
burden on communication traffic or processing resources.

45
Q

An entity assumes unauthorized logical or physical control of a system resource.

a. Misuse
b. Masquerade
c. Misappropriation
d. Inference

A

c. Misappropriation
This can include theft of service. An example is a distributed
denial of service attack, when malicious software is installed on a number of hosts
to be used as platforms to launch traffic at a target host. In this case, the malicious
software makes unauthorized use of processor and operating system resources.

46
Q

Causes a system component to perform a function or service that is detrimental to system security.

a. Misuse
b. Masquerade
c. Misappropriation
d. Inference

A

a. Misuse
Misuse can occur by means of either malicious logic or a hacker that
has gained unauthorized access to a system. In either case, security functions
can be disabled or thwarted.

47
Q

What are the assets of a computer system?

A

Hardware, Software, Data, and Communication Lines and Networks.

48
Q

_____is the most vulnerable to attack and the least susceptible to automated controls.

a. Hardware
b. Software
c. Data
d. Communication Lines

A

a. Hardware
A major threat to computer system hardware is the threat to
availability. Hardware is the most vulnerable to attack and the least susceptible to
automated controls. Threats include accidental and deliberate damage to equipment
as well as theft. The proliferation of personal computers and workstations and the
widespread use of LANs increase the potential for losses in this area. Theft of
CD-ROMs and DVDs can lead to loss of confidentiality. Physical and administrative
security measures are needed to deal with these threats.

49
Q

A key threat to software is an attack on ______

a. Confidentiality
b. Integrity
c. Availability

A

c. Availability
programs are deleted, denying access to users. . Software, especially
application software, is often easy to delete. Software can also be altered or
damaged to render it useless. Careful software configuration management, which
includes making backups of the most recent version of software, can maintain high
availability.

50
Q

A more difficult problem to deal with is software modification that
results in a program that still functions but that behaves differently than before,
which is a threat to ________
a. Confidentiality
b. Integrity
c. Availability

A

b. Integrity/authenticity
Computer viruses and related attacks fall
into this category.

51
Q

Unauthorized copy of software is a threat to ______

a. Confidentiality
b. Integrity
c. Availability

A

a. Confidentiality
A confidentiality problem is protection against software piracy. Although
certain countermeasures are available, by and large the problem of unauthorized
copying of software has not been solved.

52
Q

Attempt to learn or make use of information from the system but does not affect system resources.

a. Passive Attacks
b. Active Attacks

A

a. Passive Attack
Passive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. The goal of the attacker is to obtain information that is being transmitted.
Two types of passive attacks are release of message contents and traffic
analysis.

53
Q

What are two types of passive attacks?

A
  1. Release of message contents

2. Traffic Analysis

54
Q

_____involve modification of the data stream

a. Passive Attack
b. Active Attack

A

b. Active Attack
Active attacks involve some modification of the data stream or the creation
of a false stream and can be subdivided into four categories: replay, masquerade,
modification of messages, and denial of service.

55
Q

What are the four categories of an Active Attack?

A
  1. Masquerade
  2. Replay
  3. Modification of messages
  4. Denial of service
56
Q

Action that compromises the security of information owned by an organization.

a. security attacks
b. security mechanism
c. security service

A

a. security attacks

57
Q

Designed to detect, prevent, or recover from a security attack.

a. security mechanism
b. security service

A

a. Security Mechanism

58
Q

Intended to counter security attacks

a. security mechanism
b. security service

A

b. Security Service
A service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service

59
Q

This type of service supports applications like email where there are no prior interactions between the communicating entities.

a. Data Origin Authentication
b. Peer Entity Authentication

A

a. Data Origin Authentication
• Data origin authentication: Provides for the corroboration of the source
of a data unit. It does not provide protection against the duplication or
modification of data units. This type of service supports applications like
electronic mail where there are no prior interactions between the communicating
entities.

60
Q

Attempts to provide confidence that an entity is not performing either a masquerade or an unauthorized replay of a previous connection.

a. Data Origin Authentication
b. Peer Entity Authentication

A

b. Peer Entity Authentication
Peer entity authentication: Provides for the corroboration of the identity
of a peer entity in an association. Two entities are considered peer if they
implement the same protocol in different systems (e.g., two TCP users in two
communicating systems). Peer entity authentication is provided for use at the
establishment of, or at times during the data transfer phase of, a connection. It
attempts to provide confidence that an entity is not performing either a masquerade
or an unauthorized replay of a previous connection.

61
Q

The ability to limit and control the access to host systems and applications via communications links

a. Access Control Service
b. Nonrepudiation Service
c. Data Confidentiality Service
d. Data Integrity Service
e. Availability Service

A

a. Access Control Service
In the context of network security, access control is the ability
to limit and control the access to host systems and applications via communications
links. To achieve this, each entity trying to gain access must first be identified, or
authenticated, so that access rights can be tailored to the individual.

62
Q

Prevents either sender or receiver from denying a transmitted message

a. Access Control Service
b. Nonrepudiation Service
c. Data Confidentiality Service
d. Data Integrity Service
e. Availability Service

A

b. Nonrepudiation Service
NONREPUDIATION prevents either sender or receiver from
denying a transmitted message. Thus, when a message is sent, the receiver can
prove that the alleged sender in fact sent the message. Similarly, when a message
is received, the sender can prove that the alleged receiver in fact received the
message.

63
Q

the property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system

a. Access Control Service
b. Nonrepudiation Service
c. Data Confidentiality Service
d. Data Integrity Service
e. Availability Service

A

e. Availability Service
A variety of attacks can result in the loss of or reduction in
availability. Some of these attacks are amenable to automated countermeasures,
such as authentication and encryption, whereas others require a physical action to
prevent or recover from loss of availability.

64
Q

is the protection of transmitted data from passive attacks.

a. Access Control Service
b. Nonrepudiation Service
c. Data Confidentiality Service
d. Data Integrity Service
e. Availability Service

A

c. Data Confidentiality Service
The other aspect of confidentiality is the protection of traffic flow from
analysis. This requires that an attacker not be able to observe the source and
destination, frequency, length, or other characteristics of the traffic on a communications
facility.

65
Q

can apply to a stream of messages, a single message, or selected fields within a message

a. Access Control Service
b. Nonrepudiation Service
c. Data Confidentiality Service
d. Data Integrity Service
e. Availability Service

A

d. Data Integrity Service
the most useful and straightforward approach is total
stream protection.

66
Q

What three questions does the computer security strategy ask?

A
  1. Specification/policy: What is the security scheme supposed to do?
  2. Implementation/mechanisms: How does it do it?
  3. Correctness/assurance: Does it really work?
67
Q

formal statement of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources

a. Assurance
b. Usurpation
c. Security Policy
d. System Resource

A
c. Security Policy
factors to consider:
*value of the assets being protected
*vulnerabilities of the system
*potential threats and the likelihood of attacks
trade-offs to consider:
*ease of use versus security
*cost of security versus cost of failure and recovery
68
Q

What are the four complementary courses of action for security implementation?

A
  1. Prevention
  2. Detection
  3. Response
  4. Recovery
69
Q

the degree of confidence one has that the security measures work as intended to protect the system and the information it processes

a. Assurance
b. Evaluation

A

a. Assurance

encompasses both system design and system implementation

70
Q

process of examining a computer product or system with respect to certain criteria

a. Assurance
b. Evaluation

A

b. Evaluation

involves testing and formal analytic or mathematical techniques