Lecture 1 Flashcards
What is Information Security?
Ensure data is protected from unauthorised people, preventing them from modifying, deleting, recording etc
What and Why is a CIA Triad needed?
A model to guide policies for internet security
Needed to protect data and its services

What is Confidentiality?
Maintain sensitive data (such as personal data) from reaching to the wrong the wrong people
- Data Encryption
- Usernames/Password
- Biometric Verification
What is Integrity?
Maintaining accurate, consistant, **trusted information. **Data cannot be changed by people who don’t have access
**Back up copy must be stored **
What is Availability?
Ensurre that information is accessible and available at the right time
Maintain hardware and repair quickly
What are the few Computer Security Challenges?
- Not simple for **novice users **
- Potential attacks on security features
- Additional algorithm may be needed
- The designer will need to find > eliminate benefits > single weakness
- Managers do not see the benefits of security > failure occurs
- Requires regular and constant monitoring
- Security incorportated AFTER the design is complete
What is Attack?
An attempt of threat to companies to bypass security services and its policies
What is countermeasure?
Is an action that reduces the threat by reporting or taking action
What is Risk?
Holding a chance that a threat may lead data more vulnerable or further **harmful results **
What is Secuity Policy?
Is a set of rules that is applied to organisations to protect sensitive data and resources
What is a System Resource?
Data in the system provides further security to control access to resourcess
What is a threat?
A potential of violating and exploiting the security which may cause harm
What is Vulnerability?
A weakness in a systems design that could be exposed which can easily attack the system’s security policy
What are the Vulnerabilities of:
Corrupted, Leaky and Unavailable (CIA)
- Corrupted – Integrity
- Leaky – Confidentiality
- Unavailable or slow – Availability
What are the types of threats?
- Capable of exploiting vulnerabilities
- Potential harm to an asset
Types of Attacks
- Passive – DOES NOT affect the system resources
- Active – ATTEMPTS to change/affect the system and operation
- Insider – Initialises an entity inside the security parameter
- Outsider – Initialises from outside the **perimeter **
What is Unauthorised Disclosure? What are the 4 main points?
Gaining access to data without permission
- Exposure: Sensitive data can be released
- Interception: Authorised entity has direct access to sensitive data through authorised sources
- Inference: Unauthorised person gains access to sensitive data which is considered leaked
- Intrusion: Gaining access to sensitive data through bypassing a **system’s security **
What is Deception? List and define the 3 main classes
An event that results to an authorised entity to receive false data that may believe to be true
- Masquerade: An attack where a system/user ‘pretends’ to be an identity of another to perform a malicious act
- Falsification: Receiving false data
- Repudiation: A system tricks another by denying ‘refusing to admit’ the false** act**
What is Disruption? What are the 3 main classes?
prevents the correct operation from processing
- Incapacitation: Interrupts a system by disabling a system component
- Corruption: Changes the system operations to modify it data
- Obstruction: A threat that interrupts the delivery of the **system service **
What is Usurpation? List the classes
Controlling a system by using unauthorised entity
- Misappropriation: Unauthorised logical or physical control of a system resource
- Misuse: **abusing ** a system to perform a function that can be harmful to a security system
What is a Passive threat? Give examples
Attempts to make use of the information but DOES NOT affect the system resources
Example: Eavesdropping/monitoring
- Release message contents
- Traffic analysis
What is a Active attack? Give examples
- Hard to detect
- **Modifys **data stream – to PREVENT it
Examples:
- Masquerade
- Replay
- Modify messages
- DOS
What is Countermeasures?
Dealing with a security attack
Can be used:
- Detect/Prevent attacks from succeeding
- Recover from attacks
What is X.800?
Is a security service provided by a protocol layer of communicating open systems
What are the 3 aspects of Computer Security Strategy?
- Specification/Policy
- Implementation/Mechanism
- Correctness/Assurance
What is a Security Policy? What needs to be considered?
A set of rules to regulate how an organisation provides security services to protect their data
Factors that needs to be considered:
- Protecting assets
- Vulnerabilities of the system
- Potential threats and attacks
What security implementation should be implemented?
- Prevention
- Secure encryption algorithms
- Prevent unauthorised access - Detection
- Intrusion detection systems
- Detect Denial of Service attacks - Recovery
- Have back-up systems - Response
- Upon detection, halt attack and prevent further damage