Security Basics Flashcards
What is computer security
protection of computer systems from theft or damage to hardware or to software
What are the 3 main properties of computer security
CIA
Confidentiality
Integrity
Availability
In CIA what does C mean?
Confidentiality - is maintained if the data is kept private or restricted as intended. Only authorised users can access specific data. Users without proper authorisation are prevented from accessing important data
In CIA what does I mean
Integrity - data integrity is maintained only if the data is authentic, accurate, and reliable. Only authorised users should be able to modify specific data when needed. Make sure the data is trustworthy and free from tampering
In CIA what does A mean
Availability of data is maintained if the data can be used or obtained. Should be available to users when needed. Even if data is kept confidential and its integrity is maintained its often useless unless its available to those who need it. Systems, apps and networks must be functioning when they should
Authentication
Determining whether someone or something is in fact who or what it says it is. Only authenticated users or processes are permitted to access protected resources
Nonrepudiation
Ensure someone can’t deny or contest something. Inability to refute responsibility
Threat
Potential negative action or event that has potential to harm a computer system
Vulnerability
Weakness in an IT system that can be exploited by a threat to deliver a successful attack
Risk
Threat x Vulnerability. Potential for loss or damage when a threat exploits a vulnerability
Why bother with computer security?
Computers hold valuable info, personal info, intellectual property, government system
Examples of threats on computers
Stolen, misused, malicious intent (DoL, modify and change source code)
What are paradigms
A style of programming - the way you program
A typical example of something, a pattern or model, a distinct set of concepts or thought patterns
For any problem can be many different solutions, each solution can adopt a different approach