Chapter 1 Flashcards

1
Q

Vulnerability

A

a weakness in a system that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

A possible security harm that might exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack

A

a threat carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk

A

probability that a threat will exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Countermeasure

A

that which reduces a vulnerability, threat, attack, or risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Policy

A

a set of rules on how security services are provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asset

A

that which has value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat agent (Adversary)

A

an entity that carries out an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer security

A

deals with protecting data in the computer by preventing unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Passive threats

A

Does not modify the system
Makes use of the system without affecting the operation
monitors data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Active threats

A

attack that tries to modify the system resources.
affect the operation of the system.
modifies data that is transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack surface

A

an outward facing or reachable system vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attack Tree

A

a layered or branched structure of potentially exploitable vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fundamental security design principles

A
Economy of mechanism
Fail-safe default
complete mediation
Open design
Separation of privilege
Least privilege
Least common mechanism
Psychological acceptability
Isolation
Encapsulation
Modularity
Layering
Least astonishment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA triad

A

Confidentiality (data and privacy)
Integrity (Data and system)
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly