Definitions & Tools Flashcards

1
Q

Asset (System Resource)

A
  • Data in an information system
  • Service provided by a system
  • System capability (e.g., processing power, bandwidth, ..)
  • Component of a system (hardware, software, ..)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

Flaw/weakness in a system’s design, implementation, functionality, or management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A

possible danger that might exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk

A

An expected loss (usually, in terms of probability) that a threat will exploit a particular vulnerability with a specific harmful result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Total Risk =

A

threat x vulnerabilities x asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversary (Threat Agent)

A

An entity that attacks or is a threat to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack

A

An assault on security of a system. A deliberate attempt (in terms of method or technique) to evade security or security policy. A threat that has been carried out and causes violation of security when successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack Vector

A

a path or means (method) by which an attacker can launch an attack against the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack Surface

A
  • All (sum/collection) of the public and privately exposed system elements/connection points of the system
  • Minimizing attack surface is a basic security measure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack Categories

A

Active, Passive, Insider, Outsider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat Consequence (1)

A

Unauthorized Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exposure

A

Sensitive data directly released to unauthorized entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Interception

A

Authorized entity directly access sensitive data while that are in transit between authorized end points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Inference

A

authorized entity indirectly access sensitive data through reasoning or, as by-products of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intrusion

A

Authorized entity gains access by circumventing system’s security protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat Consequence (2)

A

Deception & Usurpation which both are threats to data/system integrity

17
Q

Threat Action (attack)

A

masquerade, falsification, repudiation, misappropriation, misuse

18
Q

Threats & consequences of attacks (3)

A

disruption (availability issue), attack: incapacitation (destruction/damage of system), obstruction (interference/blocking of system)

19
Q

Security Policy

A

Set of rules and practices that specifies and regulates the security provisions of a system

20
Q

Countermeasure

A
  • Action, device, process, technique, tool that reduces a vulnerability or a threat by minimizing the risk
  • Detect, deter, or recover from an attack
21
Q

Encryption

A

Tool for Confidentiality. The transformation of information using a secret, called an encryption key, so that the transformed information can only be read using another secret, called the decryption key (which may, in some cases, be the same as the encryption key)

22
Q

Access Control

A

rules and policies that limit access to confidential information to those people and/or systems with a “need to know.”

23
Q

Authorization

A

The determination if a person or system is allowed access to resources, based on an access control p

24
Q

Authentication

A

The determination of the identity or role that someone has. This determination can be done in a number of different ways, but it is usually based on a combination of one or more attributes: Something you know, have, are.

25
Q

Tools for Integrity:

A

Backup, Checksums, Data correcting codes

26
Q

Backups

A

periodic archiving of data

27
Q

Checksums

A

computation of a function that maps the contents of a file to a numerical value. A checksum function depends on the entire contents of a file and is designed in a way that even a small change to the input file (such as flipping a single bit) is highly likely to result in a different output value.

28
Q

Data Correcting Codes

A

methods for storing data in such a way that small changes can be easily detected and automatically corrected

29
Q

Tools for Availability

A

Physical Protections, Computational Redundancies, Recovery Mechanism

30
Q

Physical Protections

A

infrastructure meant to keep information available even in the event of physical challenges.

31
Q

Computational Redundancies

A

computers and storage devices that serve as fallbacks in the case of failures.

32
Q

Recovery Mechanism

A

restoring service or information back to its usual state with minimal disruption

33
Q

Digital Signature

A

Cryptographic computations that allow a person or system to commit to the authenticity of their documents in a unique way that achieves nonrepudiation, which is the property that authentic statements issued by some person or system cannot be denied.

34
Q

Tools for Anonymity:

A

Aggregation, Mixing, Proxies, Pseudonyms

35
Q

Aggregation

A

combining of data from many individuals so that disclosed sums or averages cannot be tied to any individual.

36
Q

Mixing

A

intertwining of transactions, information, or communications in a way that cannot be traced to any individual.

37
Q

Proxies

A

trusted agents that are willing to engage in actions for an individual in a way that cannot be traced back to that person.

38
Q

Pseudonyms

A

fictional identities that can fill in for real identities in communications and transactions, but are otherwise known only to a trusted entity.