M1: Security concepts and principles - C.1 Flashcards

1
Q

What are the fundamental goals of computer security?

A
  • Confidentiality,
  • Integrity,
  • availability,
  • authorization,
  • authentication,
  • accountability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does confidentiality mean in computer security?

A

It means keeping non-public information accessible only to authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is integrity defined in computer security?

A

Integrity ensures that data, software, or hardware remains unaltered except by authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is authorization in the context of computer security?

A

Authorization means that computing resources are accessible only by authorized entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does availability refer to in computer security?

A

Availability ensures that information, services, and resources are accessible for authorized use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is authentication in computer security?

A

Authentication assures that a principal, data, or software is genuine and as asserted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does accountability mean in computer security?

A

Accountability is the ability to identify principals responsible for past actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between trusted and trustworthy?

A

Trusted means having confidence in something, deserved or not;
Trustworthy means it reliably meets expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is confidentiality different from privacy?

A

Confidentiality protects information from unauthorized disclosure… while privacy involves protecting personally sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a security policy?

A

A security policy specifies the rules and practices for protecting assets and what is allowed or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an attack in computer security?

A

An attack is a deliberate action intended to cause a security violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a vulnerability in computer security?

A

A vulnerability is a weakness that can be exploited to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a threat in computer security?

A

A threat is any circumstance or entity that might harm assets or cause security violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is risk in computer security?

A

Risk is the expected loss due to harmful future events, considering assets, threats, and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is risk assessment?

A

Risk assessment involves analyzing factors to estimate risk and prioritize defensive measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the risk equation?

A

Risk (r) = Threat (t) x Vulnerability (v) x Cost (c).

17
Q

What is adversary modeling?

A

Adversary modeling identifies and analyzes potential attackers and their capabilities.

18
Q

What are some attributes of an adversary?

A
  • Objectives,
  • Methods,
  • Capabilities,
  • Funding level
  • Insiders or outsiders.
19
Q

What is penetration testing?

A

Penetration testing involves finding vulnerabilities by simulating attacks on a system.

20
Q

What is security analysis?

A

Security analysis identifies vulnerabilities and overlooked threats to improve defenses.

21
Q

What is a threat model?

A

A threat model identifies threats, threat agents, and attack vectors that a system defends against.

22
Q

What is diagram-driven threat modeling?

A

It uses architectural diagrams to identify and analyze potential threats and attack vectors.

23
Q

What is an attack tree?

A

An attack tree is a diagram that breaks down an attack goal into smaller, actionable steps.

24
Q

What is the purpose of attack trees?

A

To identify and prioritize potential attack vectors and help in forming security policies.

25
Q

What are attack/threat checklists?

A

Pre-constructed lists of known attacks used to ensure no threats are overlooked.

26
Q

What is the difference between insider and outsider attacks?

A

Insider attacks come from within the organization, while outsider attacks come from external entities.

27
Q

What is the role of security controls?

A

Security controls prevent, detect, and react to security violations to limit damage and recover.

28
Q

What is the significance of security policies in risk management?

A

Security policies help determine when a violation occurs and guide the implementation of controls.

29
Q

What is the goal of security analysis in the software development lifecycle?

A

To provide confidence in a system’s ability to resist attacks by identifying and addressing threats.