General knowledge Flashcards

1
Q

What is computer security?

A

The protection afforded to an automated information system to preserve the integrity, availability, and confidentiality of information system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three key objectives of computer security known as?

A

CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define confidentiality from CIA.

A

Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals

Privacy - Assures that individuals control and influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Integrity from CIA.

A

Data integrity - Assures that information and programs are changed only in a specified and authorized manner

System integrity - Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does availability from CIA assure?

A

Assures that systems work promptly and service is not denied to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is authenticity in computer security?

A

The property of being genuine and being able to be verified and trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define accountability in the context of computer security.

A

The ability to trace a security breach to a responsible party through records of system activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the tangible assets of a computer system.

A
  • Servers
  • Networking equipment
  • Storage devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the intangible assets of a computer system.

A
  • Brand reputation
  • Data
  • Software and applications
  • Encryption keys and certificates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are vulnerabilities in a computer system?

A

Weaknesses that can be exploited, potentially leading to unauthorized access or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What vulnerability can happen to a system in terms of confidentiality?

A

It can become leaky, allowing unauthorized access to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What vulnerabilities can happen to a system in terms of integrity?

A

It can be corrupted, leading to wrong outputs or functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What vulnerabilities can happen to a system in terms of availability?

A

It can become unavailable or very slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Adversary? (Theat agent)

A

An entity that attacks, or is a threat to, a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an attack?

A

A deliberate attempt to bypass security and cause harm to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a counter measure?

A

An action or tool used to reduce or prevent security threats, vulnerabilities, or attacks.

17
Q

What is risk?

A

The likelihood that a security weakness will be exploited and cause harm.

18
Q

What is security policy?

A

A set of rules that guide how a system or organization protects its data and resources.

19
Q

What is an asset?

A

Anything valuable in a system, like data, processing power, hardware, or facilities.

20
Q

What is a threat?

A

A potential danger that could take advantage of a security weakness and cause harm.

21
Q

What is a Vulnerability?

A

A flaw or weakness in a system that an attacker could exploit.

22
Q

What is Auditability?

A

An ability of a system to conduct persistent monitoring of all actions

23
Q

What is trustworthiness?

A

An ability of a system to verify identity and establish trust in third party

24
Q

What is non-repudiation?

A

An ability of a system to confirm occurrence/non-occurrence of an action

25
Q

What is privacy?

A

Ensuring that the system enables individuals to control their personal information