Part 1 Flashcards
(188 cards)
What are the 3 aspects of the CIA triad?
Confidentiality: No unauthorised reading/learning of data.
Integrity: No unauthorised modification or destruction.
Availability: Timely and reliable access to data.
What is non-repudiation?
The assurance that an entity cannot deny having done an action.
What is authenticity?
Property of being genuine and being able to be verified.
What is accountability?
Property that an action should be able to be traced back to the entity that performed it.
What are the assets of a security system?
Software
Hardware
Data
Communication facilities and networks.
What are the 3 types of vulnerability?
Leaky: Unauthorised access
Unavailable: Slow, using becomes impossible/impractical
Corrupted: wrong thing/wrong answers
What is an attack?
A thread that is carried out.
What are the two attack classifications?
Active: Attempt to alter/affect operation of assets.
Passive: Attempt to learn/make use of information from a system.
What is an inside attack?
An attack initiated by an entity inside the security perimeter.
The entity has authorised access to the system.
What is an outside attack?
An attack initiated by someone outside the security perimeter.
What is a risk?
Measure of the extent to which an asset is threatened by a potential circumstance/event.
The likelihood of occurance.
What is a countermeasure?
An action that mitigates the effects of an attack/risk.
What is encryption?
Transformation of information using a secret.
What is access control?
Rules, policies and mechanisms that limit access to resources to those people/systems with a “need to know”.
What is a “need-to-know” determined by?
Identity
Role
What is authorisation?
Determining whether a person or system is allowed to access resources, based on an access policy.
What is authentication?
Determination of role/identity.
How can an entity be authentication?
Something they have (smart card)
Something they know (password)
Something they are (biometrics)
What is physical security?
The physical barriers and restrictions used to improve the security of resources and components.
What are examples of physical security?
Copper meshes in walls
Locks
Placement of computers in windowless rooms.
Sound dampening materials.
What are backups?
Periodic archiving of data to enable restoration in the event of failure.
What are checksums?
Functions turning a file into a numerical value.
What does a checksum function rely on?
The whole file.
Flipping a single bit should change the output.
What are computational redundancies?
Computers/storage devices that serve as fallbacks in the case of failures.