CNS Reviewer Flashcards

1
Q

Status Of Security In Computing (In Early 2000s)

A
  • Some computing professionals & managers do not even recognize the value of the resources they use or control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any piece of the __ can become the target of a computing crime.

A

computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Status Of Security In Computing (In Early 2000s)

A
  • In the event of a computing crime, some companies do not investigate or prosecute.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a collection of hardware, software, data, and people that an organization uses to do computing tasks

A

computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • The _ is the most serious vulnerability.
A

weakest point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Characteristics of Computer Intrusion

A computing system,,,

A
  • The principles of easiest penetration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Breaches

A

Exposure
Vulnerability
Threats
Control
Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a form of possible loss or harm

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a weakness in the system

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Human attacks, natural disasters, errors

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a protective measure

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

h/w, s/w, data

A

*Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Security Breaches

A
  • Disclosure
  • Deception
  • Disruption
  • Usurpation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unauthorized access to info

A
  • Disclosure
  • ex: Snooping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

acceptance of false data

A
  • Deception:
  • ex: Modification, spoofing, repudiation of origin, denial of receipt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

prevention of correct operation

A
  • Disruption
  • ex: Modification, man-in-the-middle attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Components

A
  • Confidentiality
  • Integrity
    *Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

unauthorized control of some part of the system (usurp: take by force or without right)

A
  • Usurpation
  • ex: Modification, spoofing, delay, denial of service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The assets are accessible only by authorized parties.
- Keeping data and resources hidden

A
  • Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The assets are modified only by authorized parties, and only in authorized ways.
* Data integrity (integrity)
* Origin integrity (authentication)

A
  • Integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Assets are accessible to authorized parties.
- Enabling access to data and resources

A

*Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Computing System Vulnerabilities

A
  • Hardware vulnerabilities
  • Software vulnerabilities
  • Data vulnerabilities
  • Human vulnerabilities
21
Q

Software Vulnerabilities

A
  • Destroyed (deleted) software
  • Stolen (pirated) software
  • Altered (but still run) software
  • Logic bomb
  • Trojan horse
  • Virus
  • Trapdoor
  • Information leaks
22
Q
  • The principle of adequate protection
A

Data Security

23
Q
  • Storage of encryption keys
A

Data Security

24
Q
  • Software versus hardware methods
A

Data Security

25
Q

Other Exposed Assets

A

*Storage media
*Networks
*Access
*Key people

26
Q

People Involved in Computer Crimes

A

*Amateurs
*Crackers
*Career Criminals

27
Q

Methods of Defense

A
  • Encryption
  • Software controls
    *Hardware controls
  • Policies
  • Physical controls
28
Q

At the heart of all security methods

A

Encryption

29
Q

Confidentiality of data

A

Encryption

30
Q

Some protocols rely on encryption to ensure availability of resources.

A

Encryption

31
Q

__ does not solve all computer security problems.

A

Encryption

32
Q

Software controls

A
  • Internal program controls
  • OS controls
  • Development controls
33
Q

are usually the 1st aspects of computer security that come to mind.

A

Software controls

34
Q

This defines “security” for the site/system/etc.

A

Policy says what is, and is not, allowed

35
Q

enforce policies

A

Mechanisms

35
Q

can be simple but effective
Example: frequent changes of passwords

A

Mechanisms

36
Q

If policies conflict, discrepancies may create security vulnerabilities

A
  • Composition of policies
37
Q

Gradually evolving and maturing

A
  • Legal and ethical controls
38
Q

Goals of Security

A
  • Prevention *Detection *Recovery
39
Q

Prevent attackers from violating security policy

A
  • Prevention
40
Q

Stop attack, assess and repair damage
Continue to function correctly even if attack succeeds

A

*Recovery

40
Q

Detect attackers’ violation of security policy

A

*Detection

41
Q

Assurance

A
  • Specification
  • Design
  • Implementation
42
Q

How system will meet specification

A

Design

42
Q
  • Requirements analysis
  • Statement of desired functionality
A

Specification

43
Q

Programs/systems that carry out design

A

Implementation

44
Q

Operational Issues

A
  • Cost-Benefit Analysis
  • Risk Analysis
  • Laws and Customs
45
Q

Is it cheaper to prevent or to recover?

A
  • Cost-Benefit Analysis
46
Q
  • Should we protect something?
  • How much should we protect this thing?
A

Risk Analysis

47
Q

Are desired security measures illegal?
Will people do them?

A
  • Laws and Customs
48
Q

Human Issues

A
  • Organizational Problems
  • Power and responsibility
  • Financial benefits
  • People problems
  • Outsiders and insiders
  • Social engineering
49
Q
A