Security Concept (Topic One) Flashcards

1
Q

What is computer security

A

The protection afforded to an information system that aims to maintain the confidentiality, integrity and availability of the information system resources inclusive of hardware, operating systems, firmware and telecommunications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List and define the elements of the CIA triad.

A

Confidentiality: Maintaining authorized restrictions on information access and disclosure

Integrity : This prevents against unauthorized modification and deletion of data as well as ensures the reliability and nonrepudiation of data

Availability : Ensuring timely and reliable access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List and describe the two addition features of the CIA

A

Authenticity: This is the property of being genuine and being verified and trusted.

Accountability: The security feature that allows an entity’s actions to be traced back uniquely to that entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give three challenges faced by computer security

A
  1. Physical and Logical Locations needs to be determined
  2. Attackers only need to find one point of weakness while security administrators need to find as much as possible.
  3. Security requires regular and constant monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an attack?

A

Any type of malicious activity that aims to disrupt, deny, degrade or destroy information system or its recourses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define the term advisory.

A

An individual, group or government that conducts or aims to conduct any malicious activity towards information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is risk?

A

The adverse impacts that would arise if a particular activity should take place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Security Policy

A

This defines and constrains the activities of data processing facilities inorder to maintain a condition of security for systems and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Threat

A

Any circumstance that poses to potential impact an individual or group via unauthorized access or destruction of an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a vulnerability

A

A point of weakness in an information system that can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four assets of a computer system

A

Hardware
Software
Communication
Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three categories of vulnerabilities?

A

Corrupted
Leaky
Unavailable or slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the four types of attacks and describe each

A

Passive - An attempt to learn or make use of information without altering the system resources
Active - An attempt to make alterations to the system resources or operations
Insider: An entity within the system
Outsider: An entity outside of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an attack surface ?

A

Any point of the system that is vulnerable to being exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of attack surfaces?

A

Network
This category refers to vulnerabilities over an enterprise
network
Human
created by personnel
or outsiders, such as social engineering, human error, and
trusted insiders
Software
This refers to vulnerabilities in application, utility, or operating
system code. eg web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A