Key Concepts Lecture 1 Flashcards

1
Q

Name the three key goals of information security

A

Confidentiality, Availability, Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an issue that

A

It can be difficult to define who is authorised to perform what operation on which data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name some characteristics of availability (a data item or service is deemed available if…)

A

It is present in a usable form
It is making clear progress
It completes in an acceptable period of time
Requests are handled timely and fairly
It can be used easily and in the way it was intended to be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 classes of vulnerabilities?

A

Interception, Interruption, Modification, Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give an example of how each of the 4 classes of vulnerabilities can affect harware

A
Example answers:
Interruption - Denial of service
Interception - Theft
Modification - Alter the hardware to monitor the user without their permission
Fabrication - Substitution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give an example of how each of the 4 classes of vulnerabilities can affect software

A
Example answers:
Interruption - Deletion
Interception -
Modification -
Fabrication -
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of how each of the 4 classes of vulnerabilities can affect data

A
Example answers:
Interruption - Loss
Interception - 
Modification - 
Fabrication -
How well did you know this?
1
Not at all
2
3
4
5
Perfectly