Chapter 1 - Introduction Flashcards

1
Q

assets

A

items you value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

vulnerability

A

a weakness in the system that might be exploited to cause loss or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

threat

A

a set of circumstances that has the potential to cause loss or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

attack

A

A human who exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

availability:

A

the ability of a system to ensure that an asset can be used by any authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

integrity:

A

the ability of a system to ensure that an asset is modified only by authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

confidentiality:

A

the ability of a system to ensure that an asset is viewed only by authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

authentication:

A

the ability of a system to confirm the identity of a sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

nonrepudiation or accountability

A

the ability of a system to confirm that a sender cannot convincingly deny having sent something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Auditability

A

ability of a system to trace all actions related to a given asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

subject

A

the person, process, or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

object

A

the data item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

access mode

A

the kind of access (such as read, write,

or execute)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the authorization

A

policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nonmalicious

A

someone’s accidentally spilling a soft drink on a laptop, unintentionally deleting text, inadvertently sending an email message to the wrong person, and carelessly typing “12” instead of “21” when entering a phone number or clicking “yes” instead of “no” to overwrite a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

malicious, human-caused harm

A

person actually wants to cause harm, and so we often use the term attack

17
Q

random attack

A

the attacker wants to harm any computer or user;

18
Q

directed attack

A

the attacker intends harm to specific computers, perhaps at one organization or belonging to a specific
individual

19
Q

advanced persistent threat

A

attacks come from organized, well financed, patient
assailants. Often affiliated with governments or quasi-governmental groups, these attackers engage in long term campaigns. They carefully select their targets, crafting attacks that appeal to specifically those targets; email messages called spear phishing are intended to seduce their recipients.

20
Q

harm

A

The negative consequence of an actualized threat

21
Q

risk management

A

Involves choosing which threats to control and what

resources to devote to protection.

22
Q

residual risk.

A

The risk that remains uncovered by controls

23
Q

impact

A

the amount of damage it can cause

24
Q

likelihood

A

threat is not just one that someone might want to pull off but rather one that could actually occur.

25
Q

feasibility

A

Is it even possible to accomplish the attack?

26
Q

method

A

the skills, knowledge, tools, and other things with which to perpetrate the attack.

27
Q

script kiddie

A

describes someone who downloads a complete attack code package and needs only to enter a few details to identify the target and let the script perform the attack.

28
Q

Opportunity

A

the time and access to execute an attack

29
Q

motive

A

reason to want to attack.

30
Q

“attractive targets,”

A

very appealing to attackers

31
Q

attack surface

A

the system’s full set of vulnerabilities—actual and

potential.

32
Q

control or countermeasure

A

a means to counter threats

33
Q

Physical controls

A

stop or block an attack by using something tangible

34
Q

Procedural or administrative controls

A

use a command or agreement that requires or advises people how to act

35
Q

Technical controls

A

counter threats with technology (hardware or software),

36
Q

overlapping controls or defense in depth:

A

more than one control or more than one class of control to achieve protection.