Introduction and Identity Flashcards
What is the order of steps in the secure system development cycle?
Scope, Threat Analysis, Requirements Analysis, Specification, Implementation, Installation, Management and Audit
What is an asset?
Assets are the elements of a system that one might wish to protect
What is a safeguard?
A safeguard is a mechanism or procedure used to protect against threats
What are the requirements to prove identity?
Validity, sufficient supporting evidence to confirm that a person of that name exists, and verification, can you establish whether that evidence belongs to this person
How do you test validity?
Access data and examine the history and quality of the data
How do you test verification?
Verify that only the genuine subject would know the data
What are the three aspects to privacy?
Anonymity, Pseudonymity, and Unlinkability
What is Anonymity?
No party will learn any of the identities of the user
What is Pseudonymity?
A lesser form of anonymity where the user reveals a special identity to act as a pseudonym. Pseudonyms are usually short lived
What is Unlinkability?
Two pseudonyms are unlinkable if a third party cannot tell whether they belong to the same user or not
How do you identify yourself?
A user identifies themselves to a trusted body and are given an identifier to use to authenticate themselves
What is Access Control?
A generic term used for the processes by which a computer system controls the interactions between users and system resources