Week 1 Flashcards
What is Computer Security?
Measures and controls that ensure confidentiality, integrity, and availability of information system assets.
Name the 5 Computer Security Requirements (AACIA)
1_ Accountability 2_ Availability 3_ Confidentiality 4_ Integrity 5_ Authenticity
List 3 levels of impact on computer security breach
1_ Low
2_ Moderate
3_ High
Describe 3 challenges of computer security
1_ Computer security is not as simple as it might first appear to the novice.
2_ Attackers only need to find a single weakness, while the designer must find and eliminate all weaknesses to achieve perfect security.
3_ Security requires regular and constant monitoring
What is an Adversary?
An entity that has the intent to conduct detrimental activities.
What is an Attack?
Any malicious activity that attempts to destroy information system resources.
What is a Countermeasure?
A device or techniques that has as its objective the impairment of adversarial activity.
What is a Risk?
A measure of the extent to which an entity is threatened.
What is a Security Policy?
A set of criteria for the provision of security services.
What is a System Resource (Asset)?
A logically related group of systems.
What is a Threat?
Any circumstance or event with the potential to adversely impact organisational operations.
What is Vulnerability?
Weakness in an information system that could be exploited by a threat source.
List the hierarchy of assets of a computer system.
- > Hardware
- -> Software
- –> Data (raw facts and figures)
- —> Communication facilities and networks
What are the 3 categories of vulnerabilities?
1- Corrupted (loss of integrity)
2- Leaky (loss of confidentiality)
3- Very slow (loss of availability)
What are the 2 types of threats?
1- Exploit vulnerabilities
2- Harm to assets