Introduction and Identity Flashcards

1
Q

What is the order of steps in the secure system development cycle?

A

Scope, Threat Analysis, Requirements Analysis, Specification, Implementation, Installation, Management and Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an asset?

A

Assets are the elements of a system that one might wish to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a safeguard?

A

A safeguard is a mechanism or procedure used to protect against threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the requirements to prove identity?

A

Validity, sufficient supporting evidence to confirm that a person of that name exists, and verification, can you establish whether that evidence belongs to this person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you test validity?

A

Access data and examine the history and quality of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you test verification?

A

Verify that only the genuine subject would know the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three aspects to privacy?

A

Anonymity, Pseudonymity, and Unlinkability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Anonymity?

A

No party will learn any of the identities of the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Pseudonymity?

A

A lesser form of anonymity where the user reveals a special identity to act as a pseudonym. Pseudonyms are usually short lived

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Unlinkability?

A

Two pseudonyms are unlinkable if a third party cannot tell whether they belong to the same user or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you identify yourself?

A

A user identifies themselves to a trusted body and are given an identifier to use to authenticate themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Access Control?

A

A generic term used for the processes by which a computer system controls the interactions between users and system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly