Flashcards in Chapter 1 Deck (16)
what is CIA?
Confidentiality, Integrity, and Availability
what is Confidentiality
prevent unauthorized reading of information
what is Integrity?
detect unauthorized writing of information
what is Availability?
data is available in a timely manner when needed
when Bob logs into AOB how does AOB know that "Bob" is really Bob? ..Bob's password is verified..
network security issues arise
How do we secure network transactions
protocols are critically important
what does access control include?
authentication and authorization
what are the 4 main concepts?
cryptography, protocols, access control and software
what is Authentication?
passwords, biometrics, other methods of authentication
what is authorization?
access control lists/capabilities
multilevel security, firewalls, intrusion detection
what does protocols include
simple authentication protocols and real world security protocols
what is a simple authentication protocols
it focuses on basics of security protocols, lots of applied cryptography in protocols
what is a real world security protocols
SSH, SSL, IPSec, Kerberos, and in Wireless: WEP and GSM
what is included in software
security critical flaws in software and malware
what is security critical flaws in software
buffer over flow and race conditions