Introduction Flashcards

1
Q

Explain the terms method , opportunity and motive ?

A
• Method: The skills knowledge and tools that
enable the attack
• Opportunity: The time, access and
circumstances that allow for the attack
• Motive: The reason why the perpetrator
wants to commit the attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are the types of people involved in computer security?

A
Amateurs 
Crackers
Criminals
Regular
users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who are amateurs ?

A
Accidental access
to unauthorized resources
and execution of
unauthorized operations
(no harm to regular users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who are crackers?

A
Active attempts to access
sensitive resources and to
discover system
vulnerabilities
(minor inconveniences
to regular users)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who are criminals?

A
Active attempts to utilize
weaknesses in protection
system in order to steal or
destroy resources
(serious problems to
regular users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is an attack ?

A

A human exploitation of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a Vulnerability ?

A

A weakness in the security system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a Control?

A

A protective measure. An action, device
or measure taken that removes, reduces or
neutralizes a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a threat?

A

a set of circumstances that has the

potential to cause loss or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a risk?

A

Probabilities that some threat or problem

will occur due to system vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the categories of attacks

A

Attacks on hardware , Attacks on software , Attacks on data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the categories of threats

A

Interruption : A resource is lost,unavailable
or unusable
Interception : Unauthorized access to some
computer resource
Modification : Illegal or accidental change
(tampering) with a resource
Fabrication : Creation of illegal or
incorrect resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the principals of computer security

A

Confidentiality .
Integrity
Availability
Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the protection methods that are available

A

Encryption
Policies
Physical controls
SW & HW Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly