Gary 02 - Security modules Flashcards
What are the 3 basic terms that are need to be fulfilled while designing a secure system.
What is confidentaility in secure system.
(POUFNOŚĆ)
The confidentiality is focused on the information and making sure the **only thing as you can see who have a right to say the information conceded. **
Wha is an integrity in secure system.
(SPÓJNOŚĆ)
Integrity, the data has not been distributed.
What the accessability is about in secure system.
(DOSTĘPNOŚĆ)
Without access security is pointless. The secured assets has to be accesable to be used by the people who need to use them and protectes them.
What authenticity is about? Why it is so important?
(AUTENTYCZNOŚĆ)
Authenticity anwsets the question is it really from who they say it is from, is it genuine, uses digital signatures.
What is non-repudiation. Where is it used and why is it important.
(NIEZAPRZECZALNOŚĆ)
Non-repudiation is law focused, it is the obligations of a contract. So you cannot say you did not receive or did not send the transaction. Technology helps but it is Law based.
What are the other 3 things that describe security system, the incentives of creating one, the environment.
What is a threat.
the threat what it is that might happen. The thing we are securing our assets from.
What is a vulnerability.
The vulnerability where we are week. The weaknesses of our system, the potential attack points we need to focus on to secure them.
What is a controll.
The control is how do we handle the weakness to make sure that the threat doesn’t become a reality.
What is a good metaphore of secure system and why.
Chain.
Describe the Static Security Model.
How the more advance model f security look like.
What is a procedure and who has to stick/obey/follow to it?
The procedure is a set of rules how the access has to be granted and how the security has to be kepet, for example authenticity check by providing the valid password and username.
What is an ethic code?
So you will have to follow a code of ethic that appliers to security. This applies to ethical hackers.
However the Foe does not follow these codes. Kill the guard.