Threats and Attacks (Topic 2) Flashcards

1
Q

Differentiate between Deception and Disruption

A

Deception : A circumstance or event that may lead to an authorized entity receiving information and believing that it is true.

Disruption : An event that interrupts or prevents the normal operations and functions of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Differentiate between usurpation and unauthorized disclosure.

A

Unauthorized disclosure is an event that involves an entity gaining access to a system that it is not authorized to.

Usurpation: A circumstance that results in the control of system and information by an unauthorized party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the types of attacks associated with unauthorized disclosure

A
  1. Exposure
    Sensitive data are directly released
    to an unauthorized entity.
  2. Interception
    An unauthorized entity directly
    accesses sensitive data traveling between
    authorized sources and destinations.
  3. Inference
    A threat action whereby an
    unauthorized entity indirectly accesses sensitive data by reasoning
    from characteristics or by-products of
    communications.
  4. Intrusion
    An unauthorized entity gains access
    to sensitive data by circumventing a system’s security protections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of attacks are associated with deception

A
  1. Masquerade
    An unauthorized entity gains
    access to a system or performs a malicious act by posing as an authorized entity
  2. Falsification
    False data deceive an authorized
    entity.
  3. Repudiation
    An entity deceives another by
    falsely denying responsibility for an act.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What attacks are associated with disruption?

A
  1. Incapacitation
    Prevents or interrupts system
    operation by disabling a system component.
  2. Corruption
    Undesirably alters system operation by adversely modifying system functions or data.
  3. Obstruction
    A threat action that interrupts
    delivery of system services by hindering system
    operation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What attacks are associated with usurpation?

A
  1. Misappropriation
    An entity assumes unauthorized
    logical or physical control of a system resource.
  2. Misuse
    : Causes a system component to perform a
    function or service that is detrimental to system
    security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly