Cybersecurity Flashcards
Confidentiality
data confidentiality + privacy
Data confidentiality: private or confidential information is not made available or
disclosed to unauthorized individuals.
o Privacy : individuals control or influence what information related to them may be
collected and stored and by whom and to whom that information may be
disclosed.
Integrity
Data integrity: information and programs are changed only in a specified and
authorized manner.
o System integrity: system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system.
Availability
assures that systems work promptly and
service is not denied to authorized users.
Levels of Impact
Low, Moderate and HIgh
Ccryptography
which leverages hard mathematical problems with “trap door” information
Assets of computer
Hardware, software, Data, communication.
Adversary (threat)agent
Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Security Policy
A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to
maintain a condition of security for systems and data.
Threat
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or
reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access,
destruction, disclosure, modification of information, and/or denial of service.
Vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or
triggered by a threat source.
Categories of vulnerabilities
- Corrupted (loss of integrity)
- Leaky (loss of confidentiality)
- Unavailable or very slow (loss of availability
Types of Attacks
Passive Attack – attempt to learn or make use of information from the
system that does not affect system resources
• Active Attack – attempt to alter system resources or affect their
operation
• Insider Attack – initiated by an entity inside the security parameter
• Outsider Attack – initiated from outside the perimeter
Counter measure
• prevent (best option) o Cryptography, air gap • detect / respond o intrusion detection o turn off services, trace intruder • recover o you do make backups, right? Right!? • residual vulnerabilities o countermeasures can introduce new vulnerability o goal is to minimize residuals
implications of IT-configured society
o Global many-to-many scope
o Special identity conditions
o Reproducibility
Look at 41 slide for chapter 1