CNS Reviewer Flashcards
Status Of Security In Computing (In Early 2000s)
- Some computing professionals & managers do not even recognize the value of the resources they use or control.
Any piece of the __ can become the target of a computing crime.
computing system
Status Of Security In Computing (In Early 2000s)
- In the event of a computing crime, some companies do not investigate or prosecute.
a collection of hardware, software, data, and people that an organization uses to do computing tasks
computing system
- The _ is the most serious vulnerability.
weakest point
Characteristics of Computer Intrusion
A computing system,,,
- The principles of easiest penetration
Security Breaches
Exposure
Vulnerability
Threats
Control
Assets
a form of possible loss or harm
Exposure
a weakness in the system
Vulnerability
Human attacks, natural disasters, errors
Threats
a protective measure
Control
h/w, s/w, data
*Assets
Types of Security Breaches
- Disclosure
- Deception
- Disruption
- Usurpation
unauthorized access to info
- Disclosure
- ex: Snooping
acceptance of false data
- Deception:
- ex: Modification, spoofing, repudiation of origin, denial of receipt
prevention of correct operation
- Disruption
- ex: Modification, man-in-the-middle attack
Security Components
- Confidentiality
- Integrity
*Availability
unauthorized control of some part of the system (usurp: take by force or without right)
- Usurpation
- ex: Modification, spoofing, delay, denial of service
The assets are accessible only by authorized parties.
- Keeping data and resources hidden
- Confidentiality
The assets are modified only by authorized parties, and only in authorized ways.
* Data integrity (integrity)
* Origin integrity (authentication)
- Integrity
Assets are accessible to authorized parties.
- Enabling access to data and resources
*Availability