Chapter 9 - Security Flashcards
3 main characteristics of security
confidentiality
integrity
availability
what is confidentiality
the property that data or services are protected from unauthorized access
what is integrity
the property that data or services are not subject to unauthorized manipulation
3 other characteristics of security
authentication
non-repudiation
authorization
what is authentication?
verifies the identities of the parties to a transaction and checks if they are who they claim to be
what is non-repudiation
guarantees that the sender of message cannot deny having sent it and the recipient cannot deny having received it
what is authorization
grants a user privileges to perform a task
what is security
a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people and systems that are authorized
what is an attack
an action taken against a computer system with the intention of doing harm
general scenario: 2 possible values for source
human
another system
(either inside or outside organization)
general scenario: 5 possible values for stimulus
unauthorized attempt to:
- display data
- change or delete data
- access system services
- change the system behavior
- reduce availability
general scenario: 3 possible values for artifact
- data within system
- component or resources of the system
- data produced or consumed by the system
general scenario: 6 possible values for environment
- online or offline
- connected or disconnected from a network
- behind a firewall or open to a network
- fully operation
- partially operational
- not operational
general scenario: the 2 categories of the response
transactions are carried out in a certain way
the system tracks activities in it
general scenario: response: 5 ways the system carries out transactions
Draw a picture
- data or services are protected from unauthorized access
- data or services are not being manipulated without authorization
- parties to a transaction are identified with assurance
- parties to the transaction cannot repudiate their involvement
- the data resources and system services will be available for legitimate use