1 intro Flashcards

(13 cards)

1
Q

What is a system and what is security?

A

System is a specific IT installation with particular purpose and operational environment

Security is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are system assets?

A

Hardware, software, data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between data and information?

A

Data is the phyiscal phenomena chosen to represent conceptual world

The meaning assigned to data is information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is security?

A

The protection of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is unlinkability, undetectability and anonymity?

A

All are tied to confidentiality

Unlinkability: shouldnt be able to link two or more items of interest

Undetectability: shouldnt be able to know whether an item exists or not

Anonymity: shouldnt be able to identify subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is unlinkability, undetectability and anonymity?

A

All are tied to confidentiality

Unlinkability: shouldnt be able to link two or more items of interest

Undetectability: shouldnt be able to know whether an item exists or not

Anonymity: shouldnt be able to identify subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the security properties besides CIA?

A

Accountability
Non-repudiation
Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Categories of vulnerabilities?

A

Corrupted (integrity), Leaky (confidentiality), unavailable/slow (availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a security policy?

A

Plan or course of actions intended to influence and determine decisions and actions

Security policy: a statement that defines security objectives of organization. What is allowed, what is not

Two types:
- Enterprise
- System-specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does security policy need to address?

A

Scope & purpose
IT requirements
Assignments and responsibilities
Awareness training
Personnel issues
contingency planning
IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What categories can countermeasures be grouped into?

A

Deterrence
Protection and prevention
Detection
Recovery and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be said about policies and mechanisms?

A

Policies divide into secure and not secure.

Mechanisms prevents system from entering not secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is required for a security mechanism to be secure, precise and broad?

A

Secure if set of restricted states is subset of secure states
Precise if set of restricted states is equal to set of secure states
Broad if there is a state that is restricted and not secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly