test2 Flashcards
early macro-type virus, attach themselves into a document
Melisa
virus for for stealing information
duqu
Philippine students, spread by email
Love you
characterized by a greater amount of planning, a longer period of time to conduct the activity, more financial backing to accomplish it, and the possible corruption of, or collusion with, insiders
Structured threat
generally, is short-term in nature, does not involve a large group of individuals, does not have large financial backing, and does not include collusion with insiders
Unstructured threat
characterized by a much longer period of preparation (years is not uncommon), tremendous financial backing, and a large and organized group of attackers.
highly structured threat
In general terms, the methods, techniques, and tools used to ensure that a computersystem is secure.
Computer security
A hacker who has the skill level necessary to discover and exploit new vulnerabilities
Elite hacker
A hacker who uses his or her skills for political purposes
Hacktivist
A hacker with little true technical skill and hence who uses only scripts that someone elsedeveloped.
Script kiddie
The act of deliberately accessing computer systems and networks without authorization is generally know
Hacking
CIA
Confidentiality + Integrity + Availability
Protection
Prevention + ( Detection + Response)
For many years, the focus of security was on
prevention
the set of activities employed to establish a communication channel between two parties, identifying each in a manner that allows future activity without renewed authentication.
Session Management
invocation of conditions that fall outside the normal sequence of operation
Exception Management
to the proper operation of IT systems. IT systems are first and foremost systems, groups of elements that work together to achieve a desired resultant process. The proper configuration and provisioning of all of the components in a system is essential to the proper operation of the system. The design and operation of the elements to ensure the proper functional environment of a system
Configuration Management
takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole
Host Security
an emphasis is placed on controlling access to internal computers from external entities
Network Security
Use minimum privileges necessary to perform a task.
Least privilege
Access should be based on more than one item.
Separation of privilege
Deny by default (implicit deny) and only grant access with explicit permission
Fail-safe defaults
Mechanisms should be small and simple
Economy of mechanism
Protection mechanisms should cover every access to every object
Complete mediation