Intro Computer Securities Theory Flashcards
What are the basic security requirements?
Confidentiality, information can be accessed only by authorized entities
Integrity, information can be modified by authorize entities
Availability, information must be available to all parties who have a right to access it
What are the concerts to frame the problem off security
Vulnerabilities, exploits, assets, threats, and risks
Define vulnerability in terms of the security problem
It is something that allows to violate one of the constraints of the CIA paradigm
Define exploit in the context of the security problem
It is a specific way to use one or more vulnerabilities to accomplish a specific objective that violates the constraints
What are the assets in the security problem?
The assets identify what is valuable for an organization
What are the treads in the security problem?
They are the potential violation of CIA, circumstances potentially causing a CIA violation
What are the relationships between security and protection level?
When we talk about security, we talk about who is more secure, who is safer in the end, not who is more protected. On defining security and protection levels, It is also also necessary to think about the attacker/adversary, the thread model and thread landscape.
What are the tread model and the thread landscape?
The trend model are all the different types of threats that can affect me, the threat landscape, otherwise, are the threats that are around me
What are the risks in the context of security problem?
It is the statistical and economic evaluation of the exposure to damage because of the presence of vulnerabilities and threats
It is a balance between the assets, the vulnerabilities, the threats, and the cost of it all
What are the trusted elements of our systems?
They are a part of the system that will be assumed as secure
What are some of the costs of implementing security
Direct costs
● Management
● Operational
● Equipment
Indirect costs (more relevant)
● Less usability
● Slower performance
● Less privacy (due to security controls)
● Reduced productivity (users are slower)