Intro Computer Securities Theory Flashcards

1
Q

What are the basic security requirements?

A

Confidentiality, information can be accessed only by authorized entities

Integrity, information can be modified by authorize entities

Availability, information must be available to all parties who have a right to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the concerts to frame the problem off security

A

Vulnerabilities, exploits, assets, threats, and risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define vulnerability in terms of the security problem

A

It is something that allows to violate one of the constraints of the CIA paradigm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define exploit in the context of the security problem

A

It is a specific way to use one or more vulnerabilities to accomplish a specific objective that violates the constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the assets in the security problem?

A

The assets identify what is valuable for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the treads in the security problem?

A

They are the potential violation of CIA, circumstances potentially causing a CIA violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the relationships between security and protection level?

A

When we talk about security, we talk about who is more secure, who is safer in the end, not who is more protected. On defining security and protection levels, It is also also necessary to think about the attacker/adversary, the thread model and thread landscape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the tread model and the thread landscape?

A

The trend model are all the different types of threats that can affect me, the threat landscape, otherwise, are the threats that are around me

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the risks in the context of security problem?

A

It is the statistical and economic evaluation of the exposure to damage because of the presence of vulnerabilities and threats

It is a balance between the assets, the vulnerabilities, the threats, and the cost of it all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the trusted elements of our systems?

A

They are a part of the system that will be assumed as secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the costs of implementing security

A

Direct costs
● Management
● Operational
● Equipment

Indirect costs (more relevant)
● Less usability
● Slower performance
● Less privacy (due to security controls)
● Reduced productivity (users are slower)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly