Chapter #6 Flashcards
The expressions computer security and cybersecurity generally refer to computer/cyber-related concerns affecting the following topics:
reliability,
availability,
accessibility,
system safety,
data integrity,
confidentiality,
privacy.
Computer security can be defined in terms of three elements:
confidentiality, confidentiality focuses on protecting against “unauthorized persons gaining access to unauthorized information.”
integrity, integrity can be understood as “preventing an attacker from modifying data.”
accessibility, accessibility has to do with “making sure that resources are available for authorized users.”
Computer Security Issues as Distinct from Computer Crime (read)
Some cyber/computer-related crimes have no direct implications for cyber/computer security.
Consider, for example, that someone can use a computer or an electronic device to:
make unauthorized copies of software programs;
stalk a victim in cyberspace;
bully someone online;
elicit sex with young children;
distribute child pornography;
None of these (criminal) acts are a direct result of insecure computer systems.
Cyber-related security concerns (unlike those of privacy) typically arise because of either:(Concerns of the people to be specific)
- fears that many individuals and organizations have that their data could be accessed by those who have no legitimate need for, or right to, such information;
- worries that personal data or proprietary information, or both, could be retrieved and possibly altered by individuals and organizations who are not authorized to access that data.
Three Aspects of Cybersecurity:
Data, System, and Network Security
unauthorized access to data, which either is resident in or exchanged between computer systems (i.e., data security);
attacks on system resources (such as computer hardware, operating system software, and application software) by malicious computer programs (i.e., system security);
attacks on computer networks, including the infrastructure of privately owned networks and the Internet itself (i.e., network security).
Data Security:
Data security is concerned with vulnerabilities pertaining to unauthorized access to data that can either:
- reside in one or more computer storage devices,
- be exchanged between two or more computer systems.
Data-security issues affect the confidentiality, integrity, and availability of that information
System Security
System security is concerned with vulnerabilities to system resources such as computer hardware, operating system software, and application software.
It is also concerned with various kinds of viruses, worms, and related “malicious programs” that can disrupt and sometimes destroy computer systems.
Viruses and Worms
A virus is a
self-replicating piece of software code that “attaches itself to other programs and usually requires human action to propagate.”
A worm is a
self-replicating piece of code that “spreads via networks and usually doesn’t require human interaction to propagate.”
Malware
“software designed to produce, damage, or provide unauthorized access to computers or computer systems.” (This would include viruses and worms)
viruses,
worms,
Trojan horses,
logic bombs,
(at least some forms of) “spyware”.
Network Security
is concerned with securing a wide range of computer networks – i.e., from privately owned computer networks (such as LANs and WANs) to the Internet itself – against various kinds of attacks.
The Internet’s infrastructure, which includes the set of protocols that makes communication across individual (or privately owned) computer networks possible, has been the victim of several attacks.
Cloud Computing
…a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services).
The NIST definition of cloud computing :Deployment models include the:
Private Cloud,
Community Cloud,
Public Cloud,
Hybrid Cloud.
The NIST definition of cloud computing :Service models include the:
Software as a Service (or SaaS),
Platform as a Service (PaaS),
Infrastructure as a Service (IaaS).
Cloud Storage Concerns
One concern has to do with how users can control their data stored in the cloud – e.g., at present, users have very little control over or direct knowledge about how their information is transmitted, processed, or stored.
A second concern involves the integrity of the data – for example, if the host company goes out of business, what happens to the users’ data?
A third kind of concern affects questions about access to the data – i.e., can the host deny a user access to his/her own data?
A fourth concern has to do with who actually “owns” the data that is stored in the cloud.
Many businesses worry about turning over their data to third parties. What are their three concerns?
accidental loss of data,
fear of hacking attacks,
theft by “rogue employees of cloud providers.”