CS2610 Flashcards
What is C in CIA
Confidentiality: Keeping information private from unauthorized parties.
What is I in CIA?
Integrity: Keeping information from being altered by accident or by unauthorized editors.
What is A in CIA?
Availability: Making sure that info can be used when/where it is needed.
What are Assets, Threats, Safeguards, Vulnerabilities, and Exploits?
Assets are things you want to protect like info, software, hardware, bandwidth, etc. Threats are the potential for an undesirable event to befall an asset. Safeguards are controls implemented to reduce the risk of threats. Vulnerabilities are the absence or weakness of safeguards. And exploits are techniques that take advantage of vulnerabilities to attack assets.
What are the rules/guidelines of security?
The cost of providing safeguards must remain less than the cost of failing to maintain CIA. More confidentiality = less availability.
Why are our systems and networks attacked?
Stealing or gathering information, stealing money, using assets, destroy/deny assets, corrupt info, harm reputation, prepare for future action, testing of vulnerability.
What are the four elements/factors of defensibility?
Controlled: authentication, password security, access controls, and physical security
Minimized: unnecessary assets and access privileges.
Monitored: logs, audits, antivirus, intrusion detection, and file integrity.
Current: patches, updates, version checks, and backup plan.
What are the phases of an attack:
Five P’s: Probe the system, penetrate the security faults, persist and maintain access, propagate through the system and to other networks, and profit.
What is Cyberspace?
The environment in which communication/exchange of information and data over computer networks occurs.
What is Cybersecurity?
The protection of computer systems from theft or damage to their assets, or disruption of their services.
List vs stack
Spatial order vs reverse chronological order