Computer Security: Chapter 1 Flashcards

1
Q

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three objectives that are the heart of computer security:

A

The CIA triad!

Confidentiality
integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A
  • Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals
  • Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A
  • Data integrity: Assures that information and programs are changed only in a specified and authorized manner.
  • System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

definition of a loss of security in -Availability

A

Assures that systems work promptly and service is not denied to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

definition of a loss of security in - Confidentiality

A

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. Al loss of confidentiality is the unauthorized disclosure of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

definition of a loss of security in - Integrity

A

Guarding against improper information modification or destruction. Including ensuring information nonrepudiation and authenticity. a loss of integrity is the unauthorized modification or destruction of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You could add these two to the triad

A

Authenticity

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, message, or message originator. This means that users are who they say they are and that each input arriving at the system came from a trusted source.

A

Authenticity

*note: FIPS 199 includes authenticity under integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three levels of impact

A

Low
Moderate
High (even loss of life)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a security failure occurs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The advantage of the attackers

A

They only have to find a single weakness while the administrator/designer has to find and eliminate all weaknesses to achieve perfect security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The natural tendancy

A

is for people to perceive little benefit from security investment until a security failure occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is security usually viewed by users and admins?

A

An impediment to efficient and user-friendly operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An entity that attacks, or is a threat to, a system (threat agent)

A

Adversary

17
Q

A deliberate attempt to evade security services

A

An attack

18
Q

A potential for violation of security

A

A threat

19
Q

3 types of vulnerability

A

1) Corruption
2) Leaked info
3) unavailability

20
Q
  • Exposures
  • Interception
  • Inferences
  • Intrusion
A

Unauthorized Disclosure

21
Q
  • Masquerade
  • Falsification
  • Repudiaton
A

Deception

22
Q
  • Incapacitation
  • Corruption
  • Obstruction
A

Disruption

23
Q
  • Misappropriation

- Misuse

A

Usurpation