MODULE 1 Flashcards
1
Q
Computer security:
A
Measures to ensure confidentiality, integrity, and availability of information system assets
2
Q
Authenticity:
A
The property of being genuine and trusted
3
Q
Challenges of computer security:
A
- Requires constant monitoring
- Impediment to usability
- Battle of wits between attackers and admins
- Benefit not perceived until failure
- Algorithms and secret info required
- Not simple
- Decide where to deploy mechanism
- Consider potential attacks
- An after-thought
- Procedures are often counter-intuitive
3
Q
System resources:
A
- Hardware
- Software
- Data
- Communication facilities
3
Q
Countermeasures:
A
Actions to prevent, detect, recover, and minimize risks
3
Q
Threat consequences:
A
- Unauthorized disclosure
- Deception
- Disruption
- Usurpation
3
Q
Categories of attack surfaces:
A
- Network
- Software
- Human
3
Q
Attack tree:
A
A hierarchical representation of vulnerabilities
3
Q
Security functional requirements:
A
- Technical measures
- Management controls and procedures
- Overlapping technical and management
4
Q
Security strategies:
A
- Policy
- Implementation
- Assurance