Lecture 1 Flashcards
What is Information Security?
Ensure data is protected from unauthorised people, preventing them from modifying, deleting, recording etc
What and Why is a CIA Triad needed?
A model to guide policies for internet security
Needed to protect data and its services
What is Confidentiality?
Maintain sensitive data (such as personal data) from reaching to the wrong the wrong people
- Data Encryption
- Usernames/Password
- Biometric Verification
What is Integrity?
Maintaining accurate, consistant, **trusted information. **Data cannot be changed by people who don’t have access
**Back up copy must be stored **
What is Availability?
Ensurre that information is accessible and available at the right time
Maintain hardware and repair quickly
What are the few Computer Security Challenges?
- Not simple for **novice users **
- Potential attacks on security features
- Additional algorithm may be needed
- The designer will need to find > eliminate benefits > single weakness
- Managers do not see the benefits of security > failure occurs
- Requires regular and constant monitoring
- Security incorportated AFTER the design is complete
What is Attack?
An attempt of threat to companies to bypass security services and its policies
What is countermeasure?
Is an action that reduces the threat by reporting or taking action
What is Risk?
Holding a chance that a threat may lead data more vulnerable or further **harmful results **
What is Secuity Policy?
Is a set of rules that is applied to organisations to protect sensitive data and resources
What is a System Resource?
Data in the system provides further security to control access to resourcess
What is a threat?
A potential of violating and exploiting the security which may cause harm
What is Vulnerability?
A weakness in a systems design that could be exposed which can easily attack the system’s security policy
What are the Vulnerabilities of:
Corrupted, Leaky and Unavailable (CIA)
- Corrupted – Integrity
- Leaky – Confidentiality
- Unavailable or slow – Availability
What are the types of threats?
- Capable of exploiting vulnerabilities
- Potential harm to an asset