Security Basics Flashcards
What is computer security
The protection of computer systems from theft or damage to: the hardware; software and data
How do you provide the protection for computer systems
- Controlling physical access to hardware
- Controlling malpractice by users
- Protecting against harm from: network access, bad data or a code injection.
Three keys properties of computer security
Confidentiality
Integrity
Availability
(CIA)
Confidentiality
The confidentiality of data is kept private or restricted as intended. Therefore only authorised users can access specific data.
Integrity
Integrity is maintained only if data is authentic, reliable and accurate.
Availability
The availability of data is maintained if data can be used or obtained.
When is confidentiality the most important requirement?
- The value of the data depends on limiting access to it.
- Data is a proprietary data of a company
- Data is a record of peoples personal activities, or involve personal sensitive info.
When is integrity the most important requirement?
Data is financial data - Integrity is typical highest concern in banking systems.
Inaccurate and inconsistent data loses value
When is availability the most important requirement?
Data is required to be sent or seen to a larger populous.
Authentication
Determining whether someone or something is what they say they are.
Only authenticated users or processes are permitted to access protected resources
Non repudiation
The ability to ensure someone cannot deny or contest something.
So the inability to refute responsibility.
Threat
A potential negative action or event that has the potential to harm a computer system.
Vulnerability
a weakness within an IT system that can be exploited by a threat to deliver a successful attack.
Risk
The potential for loss or damage when a threat exploits a vulnerability.
Risk equation
Risk = Threat x Vulnerability