IT-Security (Chapter 1) Flashcards
Examples of Cyber-Physical Systems
Industrial Facilites
Smart Grid
Smart Transport
Smart Cities
Security vs. Safety
Security: Protection against intentional malice
Safety: Protection against accidental threats
Defintion of “Threat”
A threatin an IT-based system is any possible event or sequence of actions that might lead to a violation of one or more security goals
What is the Security Goal Acronym
CIAAC
Security Goal 1
Confidentiality:
Data transmitted/stored should only be revealed to intended audience
Confidentiality of entitiesis also referred to as anonymity
Security Goal 2
Integrity:
It should be possible to detect any modification of data
This requires to be able to identifythe creator of some data
Security Goal 3
Availability:
Services should be available and function correctly
Security Goal 4
Accountability:
It should be possible to identify the entity responsible for any communication event
Security Goal 5
Controlled Access:
Only authorized entities should be able to access certain services or information
Masquerade (Threats Technically Defined)
An entity claims to be another entity
Eavesdropping (Threats Technically Defined)
An entity reads information it is not intended to read
Authorization Violation (Threats Technically Defined)
An entity uses a service or resources it is not intended to use
Loss or Modification of (transmitted) information (Threats Technically Defined)
Data is being altered or destroyed
Denial of Communication Acts (Repudiation) (Threats Technically Defined)
An entity falsely denies its participation in a communication act
Forgery of information (Threats Technically Defined)
An entity creates new information in the name of another entity