Lecture 1 Flashcards

1
Q

What is Information Security?

A

Ensure data is protected from unauthorised people, preventing them from modifying, deleting, recording etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What and Why is a CIA Triad needed?

A

A model to guide policies for internet security

Needed to protect data and its services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Confidentiality?

A

Maintain sensitive data (such as personal data) from reaching to the wrong the wrong people

  • Data Encryption
  • Usernames/Password
  • Biometric Verification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Integrity?

A

Maintaining accurate, consistant, **trusted information. **Data cannot be changed by people who don’t have access

​**Back up copy must be stored **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Availability?

A

Ensurre that information is accessible and available at the right time

Maintain hardware and repair quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the few Computer Security Challenges?

A
  1. Not simple for **novice users **
  2. Potential attacks on security features
  3. Additional algorithm may be needed
  4. The designer will need to find > eliminate benefits > single weakness
  5. Managers do not see the benefits of security > failure occurs
  6. Requires regular and constant monitoring
  7. Security incorportated AFTER the design is complete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Attack?

A

An attempt of threat to companies to bypass security services and its policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is countermeasure?

A

Is an action that reduces the threat by reporting or taking action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Risk?

A

Holding a chance that a threat may lead data more vulnerable or further **harmful results **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Secuity Policy?

A

Is a set of rules that is applied to organisations to protect sensitive data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a System Resource?

A

Data in the system provides further security to control access to resourcess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a threat?

A

A potential of violating and exploiting the security which may cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Vulnerability?

A

A weakness in a systems design that could be exposed which can easily attack the system’s security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the Vulnerabilities of:

Corrupted, Leaky and Unavailable (CIA)

A
  1. Corrupted – Integrity
  2. Leaky – Confidentiality
  3. Unavailable or slow – Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of threats?

A
  1. Capable of exploiting vulnerabilities
  2. Potential harm to an asset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Attacks

A
  1. Passive – DOES NOT affect the system resources
  2. Active – ATTEMPTS to change/affect the system and operation
  3. Insider – Initialises an entity inside the security parameter
  4. Outsider – Initialises from outside the **perimeter **
17
Q

What is Unauthorised Disclosure? What are the 4 main points?

A

Gaining access to data without permission

  1. Exposure: Sensitive data can be released
  2. Interception: Authorised entity has direct access to sensitive data through authorised sources
  3. Inference: Unauthorised person gains access to sensitive data which is considered leaked
  4. Intrusion: Gaining access to sensitive data through bypassing a **system’s security **
18
Q

What is Deception? List and define the 3 main classes

A

An event that results to an authorised entity to receive false data that may believe to be true

  1. Masquerade: An attack where a system/userpretends’ to be an identity of another to perform a malicious act
  2. Falsification: Receiving false data
  3. Repudiation: A system tricks another by denying ‘refusing to admit’ the false** act**
19
Q

What is Disruption? What are the 3 main classes?

A

prevents the correct operation from processing

  1. Incapacitation: Interrupts a system by disabling a system component
  2. Corruption: Changes the system operations to modify it data
  3. Obstruction: A threat that interrupts the delivery of the **system service **
20
Q

What is Usurpation? List the classes

A

Controlling a system by using unauthorised entity

  1. Misappropriation: Unauthorised logical or physical control of a system resource
  2. Misuse: **abusing ** a system to perform a function that can be harmful to a security system
21
Q

What is a Passive threat? Give examples

A

Attempts to make use of the information but DOES NOT affect the system resources

Example: Eavesdropping/monitoring

  1. Release message contents
  2. Traffic analysis
22
Q

What is a Active attack? Give examples

A
  • Hard to detect
  • **Modifys **data stream – to PREVENT it

Examples:

  1. Masquerade
  2. Replay
  3. Modify messages
  4. DOS
23
Q

What is Countermeasures?

A

Dealing with a security attack

Can be used:

  • Detect/Prevent attacks from succeeding
  • Recover from attacks
24
Q

What is X.800?

A

Is a security service provided by a protocol layer of communicating open systems

25
Q

What are the 3 aspects of Computer Security Strategy?

A
  • Specification/Policy
  • Implementation/Mechanism
  • Correctness/Assurance
26
Q

What is a Security Policy? What needs to be considered?

A

A set of rules to regulate how an organisation provides security services to protect their data

Factors that needs to be considered:

  1. Protecting assets
  2. Vulnerabilities of the system
  3. Potential threats and attacks
27
Q

What security implementation should be implemented?

A
  1. Prevention
    - Secure encryption algorithms
    - Prevent unauthorised access
  2. Detection
    - Intrusion detection systems
    - Detect Denial of Service attacks
  3. Recovery
    - Have back-up systems
  4. Response
    - Upon detection, halt attack and prevent further damage