Chapter1 Flashcards

1
Q

The protection afforded to an automated information system in order to attain the applicable objectives of perserving the integrity, availability and confidentiality of information system resources

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The CIA triad

A
  • confidentiality
  • integrity
  • availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality covers:

A
  • Data confidentiality

- Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity covers:

A
  • Data Integrity

- System Integirty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preserving authorized restrictions on information access and disclosure

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Guarding against improper information modification or destruction

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ensuring timely and reliable access to and use of information

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Levels of impact:

A

Low, Moderate and High

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The loss could be expected to have a limited adverse effect on organizational operations, assets or individuals

A

low impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The loss could be expected to have a serious adverse effect on organizational operations, assets or individuals

A

moderate impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, assets or individuals

A

High impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An entity that attacks, or is a threat to, a system

A

Adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An assault on system security that derives from an intelligent threat

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it.

A

Countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A set of rules and practices that specify or regulate how a system or organization provides a security services to protect sensitive and critical system resources.

A

Security Policy

17
Q

Data contained in an information system

A

System Resource(Asset)

18
Q

A potential of violation of security.

A

Threat

19
Q

A flaw of weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security key

A

Vulnerability

20
Q

Categories of vulnerabilities

A
  • Corrupted(loss of integrity)
  • Leaky (Loss of confidentiality)
  • Unavailable or very slow(loss of availability)
21
Q
  • capable of exploiting vulnerabilities

- represent potential security harm to an asset

A

Threats

22
Q

Attacks

A
  • Passive
  • Active
  • Insider
  • Outsider
23
Q
  • Attempts to learn or make use of information from the system but does not affect system resources
  • Goal of attacker is to obtain information that is being transmitted.
  • (e.g Eavesdropping)
A

Passive Attack

24
Q

Two types of passive attack

A
  • Release of message contents

- Traffic analysis

25
Q

Active Attack

A
  • Attempts to alter system resources or affect their operation
  • Involve some modification of the data stream ir the creation of a false stream
26
Q

Four categories of Active Attack

A
  • Replay
  • Masquerade
  • Modification of messages
  • Denial of Service