Security Basics Flashcards

1
Q

What is computer security

A

protection of computer systems from theft or damage to hardware or to software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 main properties of computer security

A

CIA
Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In CIA what does C mean?

A

Confidentiality - is maintained if the data is kept private or restricted as intended. Only authorised users can access specific data. Users without proper authorisation are prevented from accessing important data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In CIA what does I mean

A

Integrity - data integrity is maintained only if the data is authentic, accurate, and reliable. Only authorised users should be able to modify specific data when needed. Make sure the data is trustworthy and free from tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In CIA what does A mean

A

Availability of data is maintained if the data can be used or obtained. Should be available to users when needed. Even if data is kept confidential and its integrity is maintained its often useless unless its available to those who need it. Systems, apps and networks must be functioning when they should

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

Determining whether someone or something is in fact who or what it says it is. Only authenticated users or processes are permitted to access protected resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nonrepudiation

A

Ensure someone can’t deny or contest something. Inability to refute responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat

A

Potential negative action or event that has potential to harm a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability

A

Weakness in an IT system that can be exploited by a threat to deliver a successful attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk

A

Threat x Vulnerability. Potential for loss or damage when a threat exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why bother with computer security?

A

Computers hold valuable info, personal info, intellectual property, government system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of threats on computers

A

Stolen, misused, malicious intent (DoL, modify and change source code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are paradigms

A

A style of programming - the way you program
A typical example of something, a pattern or model, a distinct set of concepts or thought patterns
For any problem can be many different solutions, each solution can adopt a different approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly