Key Concepts Lecture 1 Flashcards
Name the three key goals of information security
Confidentiality, Availability, Integrity
What is an issue that
It can be difficult to define who is authorised to perform what operation on which data
Name some characteristics of availability (a data item or service is deemed available if…)
It is present in a usable form
It is making clear progress
It completes in an acceptable period of time
Requests are handled timely and fairly
It can be used easily and in the way it was intended to be used
What are the 4 classes of vulnerabilities?
Interception, Interruption, Modification, Fabrication
Give an example of how each of the 4 classes of vulnerabilities can affect harware
Example answers: Interruption - Denial of service Interception - Theft Modification - Alter the hardware to monitor the user without their permission Fabrication - Substitution
Give an example of how each of the 4 classes of vulnerabilities can affect software
Example answers: Interruption - Deletion Interception - Modification - Fabrication -
Give an example of how each of the 4 classes of vulnerabilities can affect data
Example answers: Interruption - Loss Interception - Modification - Fabrication -