Definitions Flashcards

Learn core definitions used throughout the module

1
Q

Information Security

A

The protection of information systems in order to preserve the confidentiality, availability and integrity of their assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Only authorised people or systems must be able to access protected assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Assets such as data and services must be accessible to authorised parties at the appropriate times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A
Assets must be:
Precise
Accurate
Unmodified (unless in an authorised way by an authorised entity)
Consistent
Meaningful
Usable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability

A

A weakness in the information system that can be exploited to cause loss or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat

A

A set of circumstances that has the potential to cause loss or harm, often through exploiting a vulnerability. A threat is blocked by a control of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Control

A

A protective measure that removes or reduces a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Interception

A

Unauthorised party has gained access to an asset. A class of vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Interruption

A

An asset becomes lost, unavailable or unusable. A class of vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Modification

A

Unauthorised party tampers with an asset. A class of vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fabrication

A

Unauthorised party creates a counterfeit asset. A class of vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption

A

scramble data so that the interpretation is meaningless for an intruder without knowledge of how the scrambling was done. A type of control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software controls

A

Programs must enforce security restrictions. A type of control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware controls

A

Ways to prevent unauthorised access to hardware. Examples include locks, intrusion detection systems, hardware implementations of encryption. A type of control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Policies and procedures

A

Rules and standards put in place to prevent threats. Examples are regular password changes, rules for accessing sensitive data. A type of control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptography

A

“secret writing”
The art and science of concealing meaning
Strongest control tool against numerous security threats
Building on multiple areas of higher mathematics

17
Q

Encryption(encoding, enciphering)

A

the process of scrambling a message so that its meaning is not obvious

18
Q

Decryption(decoding, deciphering)

A

the process of reversing the scrambling of a message so that its meaning is obvious

19
Q

Plaintext

A

the original message

20
Q

Ciphertext

A

the encrypted message

21
Q

Key

A

a device used to influence the way in which encryption and decryption are carried out

22
Q

Cryptosystem (cipher)

A

a system for encryption and decryption