Chapter 1: Introduction Flashcards

(48 cards)

1
Q

The protection of assets on a computer or computer system

A

Computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Items of value on a computer or computer system

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardware or software that is commercially available (not custom-made) and can be easily replaced

A

Off-the-shelf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A weakness in the system that can be exploited to cause harm or loss

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A set of circumstances that has the potential to cause loss or harm

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When a vulnerability is exploited to cause harm or loss

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An action, device, procedure, or technique that removes or reduces a vulnerability

A

Control or countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ability of a system to ensure that an asset is viewed only by authorized parties

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ability of a system to ensure that an asset is modified only by authorized parties

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ability of a system to ensure that an asset can be used by authorized parties

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ability of a system to confirm the identity of a user

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ability of a system to confirm that a user cannot convincingly deny having committed a given action

A

Nonrepudiation or Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The three acts that characterize the kinds of harm that can be committed against an asset

A

Interception, Interruption, and Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The term for a person, process, or program accessing a data item

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A data item being accessed by a person, process, or program

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The kind of access granted to a person, process, or program to a data item

A

Access mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The authorization permitting a person, process or program to access a data item

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A key model of computer security in which one or more policies are designed to guide the way access is permitted to subjects of a given object

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Harm caused by natural disasters, loss of electrical power, or failure of a component

A

Nonhuman threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Harm caused by user error

A

Nonmalicious harm

21
Q

An attack in which the attacker is attempting to cause harm to any computer or user without prior knowledge of that computer or user

A

Random attack

22
Q

An attack directed at a specific computer, user, or organization

A

Directed attack

22
Q

A dictionary of publicly known security vulnerabilities and exposures

A

The Common Vulnerabilities and Exposures (CVE) list, available at cve.org

23
Q

A standard measurement system that allows accurate and consistent scoring of the impact of vulnerabilties

A

The Common Vulnerability Scoring System (CVSS), available at nvd.nist.gov/vuln-metrics/cvss

24
A threat against many computers that belong to a network
Cyberthreat
25
The online world of computers
Cyberspace
26
An illegal attack against computers connected to or reached from their network, as well as their users, data, services, and infrastructure
Cybercrime
27
Security as applied to individual computers and devices, as well as to the broader collection of devices in networks with other users and devices
Cybersecurity
28
Threats that come from organized, well-financed, patient assailants engaging in long-term campaigns targeted at specific systems or users
Advanced persistent threats
29
The members of a cybercrime team that manage their team's full slate of malicious payloads (viruses, ransomware, denial-of-service attack packets), deciding which tool to use and which moment represents the best opportunity to launch an attack
Network administrators
30
The members of a cybercrime team that are charged with making sure that any and all malicious software that is successfully installed on a target's systems continues running for as long as possible
Intrusion specialists
31
The members of a cybercrime team that organize and reformat stolen data in order to make sense of it
Data miners
32
The members of a cybercrime team that are tasked with developing new variations of malicious software capable of infecting targeted systems, spreading quickly and widely, and evading detection
In-house programmers
33
The members of a cybercrime team that determine how much money the specific stolen information is worth on various black markets
Financial specialists
34
The negative consequences of actualized threats
Harm
35
The process of choosing which threats to try to mitigate
Risk management
36
The amount of risk that remains uncovered by controls or countermeasures
Residual risk
37
The amount of damage or potential harm that can be caused by a threat
Impact
38
The three elements a malicious attacker must have to be successful
Method, opportunity, and motive (also called MOM)
39
The skills, knowledge, tools, and other things with which to perpetrate an attack
Method
40
The time and access needed to execute an attack
Opportunity
41
The reason to perpetrate an attack
Motive
42
An attacker that downloads a complete attack code package and needs only to enter a few details to identify the target and perform an attack
Script kiddie
43
A system's full set of vulnerabilities, both actual and potential
Attack surface
44
Controls or countermeasures that use tangible objects or people to stop or block an attack or threat
Physical controls
45
Controls or countermeasures that use commands or agreements to require or advise people how to act
Procedural controls or administrative controls
46
Controls or countermeasures that use technology to counter threats
Technical controls
47
The use of more than one control or countermeasure, or the use of more than one class of control or countermeasure to achieve protection
Overlapping controls or defense in depth