Mindset Goals Challenges Flashcards

1
Q

Security

A

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resource; multilayered multifaceted concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

C.I.A. Triad

A

Confidentiality, integrity, and availability, a well-known, venerable model for the development of security policies used in identifying problem areas, along with necessary solutions in the arena of information security. Primary security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

avoidance of the unauthorized disclosure of information; access control lists, encryption; privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

The property that information has not be altered in an unauthorized way. Designed to protect data from deletion or modification from any unauthorized party; use version control, access control, security control, data logs and checksums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

The property that information is accessible and modifiable in a timely fashion by those authorized to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Means to Managing Confidentiality

A

Access control lists, volume and file encryption, and Unix file permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Challenges

A

Not easy. Have to forward think of potential attacks. Hackers only need fine one weakness vs. developers need to guard all; battle of wits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Challenges with User & System Designers

A

They sometimes don’t see the benefits until attack occurs; an afterthought

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Challenges w/Monitoring

A

Requires constant monitoring; expensive; consider security investment w/little value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Challenges w/Usability

A

Thought of as an interference with usability. May involve additional algorithms; procedures to provide some services maybe counterintuitive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Challenges w/security Mechanisms

A

Involve more than one particular algorithm and/or information–question can be raised about creation, distribution, and protection of these.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A.A.A.

A

is a method you can use in your network to control which administrators are allowed to connect to which devices (authentication), what they can do on these devices (authorization), and log what they actually did while they were logged in (accounting).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authenticity

A

the ability to determine that statements, policies, and permissions issued by persons or systems are genuine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Non-repudiation

A

Is the ability to guarantee that someone cannot deny something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assurance

A

how trust is provided and managed in computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trust Management depends on

A

Policies, Procedures, and Protections

17
Q

Anonymity

A

property that certain records or transactions not to be attributable to any individual; subtle difference between confidentiality

18
Q

Low Risk

A
  • System processes and/or stores public data
  • System is easily recoverable and reproducible
  • System provides an informational / non-critical service
19
Q

Moderate Risk

A
  • System processes and/or stores non-public or internal-use data
  • System is internally trusted by other networked systems
  • System provides a normal or important service
20
Q

High Risk

A
  • System processes and/or stores confidential or restricted data
  • System is highly trusted by UI networked systems
  • System provides a critical or campus-wide service