Introduction to Information security Flashcards
What is a threat
A potential occurence that can have an adverse effect on the assets and resources of a system
What is a vulnerability
A characteristic in a system that allows for a threat to occur. A weakness in the system that makes the threat possible.
What is an attack
An action that involves exploiting a system vulnerability in order to cause an existing threat to occur
What are the 4 types of threats?
Disclosure, deception, disruption and usurpation
What is disclosure?
When information is available or leaked to an attacker
What is deception?
Providing false information or tricking someone to do what you want them to do.
What is disruption?
Preventing communication from happening, for example disrupting information from being shared
What is disruption?
Preventing communication from happening, for example disrupting information from being shared
What is usurpation?
When someone gets unauthorized access to a system or parts of a system.
What is snooping?
And disclosure attack where someone is getting and viewing information they weren’t supposed to have. Usually done with direct access to a machine
What is the CIA triad that is used to uphold computer security?
Upholding the three properties of confidentiality, integrity and availablility
What is confidentiality?
Prevention of disclosure of authorized information
What is integrity?
Prevention of unauthorized modification of information
What is availability?
The ability to withstand unauthorized withholding of information.
The necessary and promised data and system functionality should be available for indiviuals when they need them to be.
What is accountability in respect to of information security?
Who can you blame or account resources to
What is non-repudiation?
Not being able to deny one’s actions or repudiate, because of evidence or records of the action happening
What is computer security?
A system needs to behave in the way the designer intended it to.
Preventing attackers from achieven objectives through unautherized acces or use of systems.
How a system behaves in respect to integrity, confidentiality and availability.
What are security policies?
Policies set by organizations to keep their organization secure.
Tells what you are and aren’t supposed to do (i.e. going to certain websites on a work computer, downloading apps)
What is security mechanisms?
Ways to enforce security policies to make them work in practice.
What is one way that a security policy can be viewed as successful/effective?
When the policy handles multiple states of a system (secure states, insecure state) and there is no way for a system to transition to move from a secure to an insecure state. The system must also begin in a secure state.
What are three concept that can be used in security mechanisms to enforce security policies
Prevention (making sure aspects of the policy can’t be violated)
Detection (detecting policy violation, or determining when the policy was violated).
Recovery (Being able to revert back to a secure state after violation).
What are some types of security mechanisms?
Physical controls: Physical mechanisms that stop things from happening (locks)
Hardware and software controles: Mechanisms that can run checks/test to ensure a policy is held (access control, authorization).
Cryptography: Enforces confidentiality and integrity inside computer systems.
What are some methods to decide what security mechanisms to put into practice?
Evaluate added cost to possible mechanisms when their in use - mitigating (how to make things expensive for an attacker)
Laws and regulations
Risk analysis and assesment (likelyhood, possible consequences, how tolerable is the risk)’
Cost-benefit analysis (calculates the benefits of implementation and the associated cost of doing so)
Human issues (usability): Prioritizing mechanisms that are easy for users to use or realistic that users actually will use properly
What does security mechanisms want to accomplish?
Making the system so difficult to attack or so expensive to penetrate that it is no longer worth it for an attacker to do so