Security Basics Flashcards

1
Q

What is computer security

A

The protection of computer systems from theft or damage to: the hardware; software and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you provide the protection for computer systems

A
  • Controlling physical access to hardware
  • Controlling malpractice by users
  • Protecting against harm from: network access, bad data or a code injection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three keys properties of computer security

A

Confidentiality
Integrity
Availability
(CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

The confidentiality of data is kept private or restricted as intended. Therefore only authorised users can access specific data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Integrity is maintained only if data is authentic, reliable and accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

The availability of data is maintained if data can be used or obtained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is confidentiality the most important requirement?

A
  • The value of the data depends on limiting access to it.
  • Data is a proprietary data of a company
  • Data is a record of peoples personal activities, or involve personal sensitive info.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When is integrity the most important requirement?

A

Data is financial data - Integrity is typical highest concern in banking systems.
Inaccurate and inconsistent data loses value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When is availability the most important requirement?

A

Data is required to be sent or seen to a larger populous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A

Determining whether someone or something is what they say they are.
Only authenticated users or processes are permitted to access protected resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Non repudiation

A

The ability to ensure someone cannot deny or contest something.
So the inability to refute responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat

A

A potential negative action or event that has the potential to harm a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability

A

a weakness within an IT system that can be exploited by a threat to deliver a successful attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk

A

The potential for loss or damage when a threat exploits a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk equation

A

Risk = Threat x Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are unsecured systems and data irresistible targets for cyber criminals?

A

There might be information of sensitive nature. Such as personal information, bank details, health records.

17
Q

What could cyber criminals do to your computer

A

Data in a computer may be stolen.
It may be misused or altered by unauthorised intrusion.
Malicious intents such as: modifying source code, changing passwords, posting derogatory content.

18
Q

DDOS

A

Distributed denial of service, it is an attack made to prevent access to a website by crashing its server

19
Q

What costs come with cyber security

A

Economic cost
Reputational cost
Regulatory costs

20
Q

Economic cost

A

Theft of intellectual property, corporate information, disruption in trading, and the cost of repairing damaged systems

21
Q

Reputational cost

A

Loss of consumer trust, loss of current and future customers to competitors and poor media coverage.

22
Q

Regulatory cost

A

GDPR and other data breach laws mean that organisations can suffer fines or sanctions as a result of cyber crimes