Computer Security Flashcards
What is computer security
measures and controls that ensure confidentiality, integrity and availablity
What are two other aspects of the CIA triad
Authenticity and Accountability
Challenges of security
Not simple to a novice
Procedures often counter intuative
must always consider security
physical and logical placement needs to be determined
attackers only need to find a single weakness
security is often an afterthought
Security requires regular monitoring
users perceive little benefit until breach occurs
users see security as an impediment
Types of vulnerabilities
Corrupted (integrity), leaky (Confidentiality), Unavailable (Availability)
Types of attacks
Passive, active, insider, outsider
Counter measures
prevent - detect - recover
residual vulnerabilities may remain
may create new vulnerabilities
goal is to minimise level of risk
Unauthorised Disclosure
Exposure, Interception, Inference, Intrusion
Deception
Masquerade, falsification, repudiation
Disruption
Incapaciation, Corruption, Obstruction
Usurpation
Misappropriation, misuse