Introduction Flashcards

1
Q

What is a vulnerability?

A

A weakness that could be exploited to cause harm to assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat?

A

A threat is a set of circumstances that could cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A human who exploits a vulnerability perpetuates a/an ________ on the system.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a control?

A

Controls prevent threats from exercising vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What characteristics are both basic security properties and the objects of security threats?

A

Availability, integrity and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define availability.

A

The ability of a system to ensure that an asset can be used by any authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define integrity.

A

The ability of the system to ensure that an asset is modified only by authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define confidentiality.

A

The ability of a system to ensure that an asset is viewed only by authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the relationship between vulnerability, threat and control?

A

A threat is blocked by control of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The properties as the hallmarks of solid security are also known as what?

A

C-I-A triad or security triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the security properties in communication networks?

A

Authentication and accountability/nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define authentication.

A

The ability of a system to confirm the identity of the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define accountability.

A

The ability of a system to confirm that the sender cannot convincingly deny having sent something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define authentication.

A

The ability of a system to confirm the identity of the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define accountability.

A

The ability of a system to confirm that the sender cannot convincingly deny having sent something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Harms can be characterized by what acts?

A

Interception, interruption, modification, fabrication.