Computer Security Overview Flashcards
C.I.A. Triad
Confidentiality, Integrity, & Availability
preventing unauthorized disclosure of information
Data Confidentiality
The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).
Computer Security
preventing unauthorized collection of personal information
Privacy
preventing unauthorized changes to data and programs
Data integrity
Two types of Confidentiality
Data & Privacy
Two types of Integrity
Data & System
ensuring that the system can perform as intended
System integrity
Ensuring that systems work promptly and service is not denied to authorized users
Availability
Encryption, Access Control, Authentication, Authorization, and Physical Security are methods for achieving what?
Confidentiality
transforming the information so it is useful only to the intended recipient or user
Encryption
rules and policies that limit access to private information
Access Control
determining who the user is (e.g., password, token, fingerprint)
Authentication
determining the level of access (per access control policies)
Authorization
for example, placing sensitive data in a closed room with no communication links, so one would need to be in the room to access the data
Physical Security
Backups, checksums, and Data correcting codes are methods for achieving what?
Integrity
periodic archiving, to support restoration.
Backups
computing a numerical value based on the contents of an entire file, to support the detection of alterations
Checksums
low-level codes for automatically correcting errors, such as for retransmitting packets when communicating.
Data correcting codes
Physical protections and Computational redundancies are methods for achieving what?
Availability
Backup power supplies and redundant disk storage help achieve what?
Availability
infrastructure meant to keep information available even in the event of physical challenges
Physical protections
computers and storage devices that serve as fallbacks in the case of failures
Computational redundancies
the property of being genuine and being able to be verified and trusted
i.e., that users are who they say they are, and each input arriving at the
system is from a trusted source
Authenticity
The primary tool of ___ is digital signatures, to support nonrepudiation
Authenticity
the property that actions of an entity (person, system) be uniquely traced to that entity
i.e., to trace a security breach to a responsible party
Accountability
activity logs to support nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action and legal action is an example of…
Accountability
security breach loss could be expected to have a limited adverse effect on organization operations, assets, or individuals
Low impact
security breach loss could be expected to have a serious adverse effect on organization operations, assets, or individuals
Moderate impact
security breach loss could be expected to have a severe or catastrophic adverse effect on organization operations, assets, or individuals
High impact
Truly ___systems are not yet achievable
secure
___ need to find only a single weakness, but ___ must find all weaknesses
Attackers, developers
Users and system managers tend not to see the benefits of ___ until a failure occurs
security
___ is often considered as an add-on after the system is fully designed
Security