Topic 1 - Reset Flashcards
Any transaction online, including online banking, software services, remote service providers, or online course platforms.
E-commerce
What is E-commerce?
Any transaction online, including online banking, software services, remote service providers, or online course platforms.
Characteristics of information to be useful
- Accurate
- Timely
- Complete
- Verifiable
- Consistent
- Available
Characteristics of information to be useful
You might want:
- Privacy
- Protection against phishing, vishing
- Integrity
- Authentication
- Authorization
- Confidentiality
- Non-repudiation
- Availability
Aspects of Information Needing protection
Availability
timely, reliable access to data and information services for authorized users
Aspects of Information Needing protection
Integrity
you can only see the data but you cannot change it, protection against unauthorized modification or destruction of information
Aspects of Information Needing protection
Confidentiality
assurance that information is not disclosed to unauthorized parties
Aspects of Information Needing protection
Authentication
to identify and verify user’s identity , security measures to establish the validity of a transmission, message or originator
Aspects of Information Needing protection
Non-repudiation
you cannot deny the authenticity/validity of an act you committed, sender given proof of data delivery and recipient given proof of sender’s identity so that neither can deny processed data
Aspects of Information Needing protection
- Availability
- Confidentiality
- Authentication
- Non-repudiation
is the resource being protected
Assets
Assets
Physical assets
devices, computers, people
Assets
Logical assets
information, data (in transmission, storage, or processing), and intellectual property
Assets
System assets
any software, hardware, data, administrative, physical, communications, or personnel resource within an information system
Attacks
Passive attack
an attack in which the attacker observes interaction with the system
Active attack
an attack in which the attacker directly interacts with the system
Unintentional attack
an attack where there is not a deliberate goal of misuse
Exposure
is an instance when the system is vulnerable to attack
Compromise
is a situation in which the attacker has succeeded
is a recognized, action specific, generalized or theoretical that an adversary (threat actor) might be expected to take in preparation for an attack
Indicator
Consequence
is the outcome of the attack, may cause the information system to lose effectiveness and may have other costs
Consequence
Disruption
targets availability
Consequence
Corruption
targets integrity
Consequence
Exploitation
targets confidentiality
is a type of consequence, involving accidental exposure of information to an agent not authorized access.
Inadvertent disclosure
Taxonomy of attacks with relation to security goals
- Threat to Confidentiality
- Threat to integrity
- Threat to availability
Taxonomy of attacks with relation to security goals
Threat to Confidentiality
- Snooping
- Traffic analysis
Taxonomy of attacks with relation to security goals
Threat to integrity
- Modification
- Masquerading
- Replaying
- Repudiation
Taxonomy of attacks with relation to security goals
Threat to availability
Denial of service
Security Attack
Confidentiality
information needs to be hidden from unauthorized access
Security Attack
Integrity
protected from unauthorized change
Availability
Available to an authorized entity when it is needed
- Accurate
- Timely
- Complete
- Verifiable
- Consistent
- Available
Characteristics of information to be useful
timely, reliable access to data and information services for authorized users
Aspects of Information Needing protection
Availability
you can only see the data but you cannot change it, protection against unauthorized modification or destruction of information
Aspects of Information Needing protection
Integrity
assurance that information is not disclosed to unauthorized parties
Aspects of Information Needing protection
Confidentiality
to identify and verify user’s identity , security measures to establish the validity of a transmission, message or originator
Aspects of Information Needing protection
Authentication
you cannot deny the authenticity/validity of an act you committed, sender given proof of data delivery and recipient given proof of sender’s identity so that neither can deny processed data
Aspects of Information Needing protection
Non-repudiation
- Availability
- Confidentiality
- Authentication
- Non-repudiation
Aspects of Information Needing protection
Assets
is the resource being protected
devices, computers, people
Assets
Physical assets
information, data (in transmission, storage, or processing), and intellectual property
Assets
Logical assets
any software, hardware, data, administrative, physical, communications, or personnel resource within an information system
Assets
System assets
an attack in which the attacker observes interaction with the system
Attacks
Passive attack
an attack in which the attacker directly interacts with the system
Active attack
an attack where there is not a deliberate goal of misuse
Unintentional attack
is an instance when the system is vulnerable to attack
Exposure
is a situation in which the attacker has succeeded
Compromise
Indicator
is a recognized, action specific, generalized or theoretical that an adversary (threat actor) might be expected to take in preparation for an attack
is the outcome of the attack, may cause the information system to lose effectiveness and may have other costs
Consequence
targets availability
Consequence
Disruption
targets integrity
Consequence
Corruption
targets confidentiality
Consequence
Exploitation
Inadvertent disclosure
is a type of consequence, involving accidental exposure of information to an agent not authorized access.
- Threat to Confidentiality
- Threat to integrity
- Threat to availability
Taxonomy of attacks with relation to security goals
- Snooping
- Traffic analysis
Taxonomy of attacks with relation to security goals
Threat to Confidentiality
- Modification
- Masquerading
- Replaying
- Repudiation
Taxonomy of attacks with relation to security goals
Threat to integrity
Denial of service
Taxonomy of attacks with relation to security goals
Threat to availability
information needs to be hidden from unauthorized access
Security Attack
Confidentiality
protected from unauthorized change
Security Attack
Integrity
Available to an authorized entity when it is needed
Availability