Reading 1 Flashcards

1
Q

Computer system

A

hardware,software,data that have value and deserve security protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assets

A

Protection of the items you value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Value of an asset depends on what?

A

User own interpretation of the assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

weakness that could be exploited to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

to a computing system is a set of circumstances that has the potential to cause harm or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attack

A

human who exploits a vulnerabilityu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

We consider potential harm to assets by what two ways?

A

We can look at what bad things happens to assets.

We can look at who or what can cause or allow bad things to happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Ability of a system to ensure that an asset can be used by any authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A

Ability of a system to ensure that an asset is modified only by authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Ability of a system to ensure that an asset is viewed only by authorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIa triad

A

stands for confidentiality, availability, and integrity basis for all cyber security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security triad

A

CIA triad plus accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentuication

A

Ability of a system to confirm the identity of a sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accountability

A

ability of a system to confirm that a sender cannot convincingly deny having sent something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Subject

A

Person process or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Object

A

data item

17
Q

Access mode

A

The kind of access

18
Q

Policy

A

Authorization

19
Q

Access control

A

computer security controls all accesses by all subject to all protected objects in all mode of access.

20
Q

Prevent

A

Blocking attack or closing the vulnerabiltiies

21
Q

Deter

A

Making the attack harder but not impossible.

22
Q

Deflect

A

Making it another target more attractive.

23
Q

Physical controls

A

sto por block an attack by using something tangible.

24
Q

Procedural controls

A

use command agreement to stop attack

25
Q

Technical controls

A

counter threats with technology

26
Q

Defense in depth

A

more than one control or more one class of controls to achieve protection.