CSC2031 Flashcards
How would you ensure data entered in a form is of the correct type?
Use appropriate form data fields.
How would you secure a password before storing it in a database?
Use hashing.
What could you do to prevent information leakage when something goes wrong in a web application.
Implement custom error pages.
Define Computer Security
Computer security is the protection of computer systems from theft or damage
What three things does computer security involve controlling?
Physical access to hardware, malpractice by users and network access, bad data, or code injection.
What are the three key properties of computer security
CIA Triad
Confidentiality
Integrity
Availability
Define Confidentiality
Data is kept private or restricted by ensuring only authorised users can access it.
When is confidentiality more important than other properties?
The value of the data depends on limiting access to it.
Examples: propriety data of a company, records of people’s personal activities, personal and financial information of a company’s customers
Define Integrity
Data is kept authentic, accurate and reliable by ensuring only authorised users can modify it.
When is integrity more important than other properties?
Data must be accurate and consistent.
Examples: financial records, exam results, medical records.
Define Availability
Data is kept available to authorised users when they need it.
When is availability more important than other properties?
Data must be sent or seen
Examples: urgent government press release, medical records, authentication data.
What are the two other security properties?
Authentication
Non-repudiation
Define Authentication
Determining whether someone or something is, in fact, who or what they claim to be.
Define Non-repudiation
Ensuring that someone or something cannot deny or contest something (The inability to refute responsibility).
What is the relationship between Threat, Vulnerability and Risk?
Risk = Threat x Vulnerability
Define Threat
A potential negative action or event that has the potential to harm a computer system.
Define Vulnerability
A weakness in a computer system that can be exploited by a threat to deliver a successful attack.
Define Risk
The potential (or chance) for loss or damage when a threat exploits a vulnerability.
Why does computer security matter?
Computer Systems are Valuable Targets
Computer Systems have many Security Threats
Cybercrime is Growing
Cybercrime Comes With a Cost
What are the main costs for victims or cybercrime
Economic Cost - Theft of IP, corporate information, disruption in trading, cost of repairing damaged systems.
Reputational Cost - Loss of consumer trust, loss of current and future customers to competitors, and poor media coverage.
Regulatory Cost - The General Data Protection Regulation (GDPR) and other data protection laws mean that organisations can suffer from large regulatory fines or sanctions as a result of cybercrimes.
Define Paradigm
A paradigm is defined as a pattern, model, approach, or distinct set of concepts or thought patterns
Define Programming Paradigm
A programming paradigm can simply be defined as a style of programming
A programming paradigm is a programming language. True or False?
False