Chapter 1 - Introduction Flashcards

1
Q

assets

A

items you value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

vulnerability

A

a weakness in the system that might be exploited to cause loss or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

threat

A

a set of circumstances that has the potential to cause loss or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

attack

A

A human who exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

availability:

A

the ability of a system to ensure that an asset can be used by any authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

integrity:

A

the ability of a system to ensure that an asset is modified only by authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

confidentiality:

A

the ability of a system to ensure that an asset is viewed only by authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

authentication:

A

the ability of a system to confirm the identity of a sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

nonrepudiation or accountability

A

the ability of a system to confirm that a sender cannot convincingly deny having sent something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Auditability

A

ability of a system to trace all actions related to a given asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

subject

A

the person, process, or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

object

A

the data item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

access mode

A

the kind of access (such as read, write,

or execute)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the authorization

A

policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nonmalicious

A

someone’s accidentally spilling a soft drink on a laptop, unintentionally deleting text, inadvertently sending an email message to the wrong person, and carelessly typing “12” instead of “21” when entering a phone number or clicking “yes” instead of “no” to overwrite a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

malicious, human-caused harm

A

person actually wants to cause harm, and so we often use the term attack

17
Q

random attack

A

the attacker wants to harm any computer or user;

18
Q

directed attack

A

the attacker intends harm to specific computers, perhaps at one organization or belonging to a specific
individual

19
Q

advanced persistent threat

A

attacks come from organized, well financed, patient
assailants. Often affiliated with governments or quasi-governmental groups, these attackers engage in long term campaigns. They carefully select their targets, crafting attacks that appeal to specifically those targets; email messages called spear phishing are intended to seduce their recipients.

20
Q

harm

A

The negative consequence of an actualized threat

21
Q

risk management

A

Involves choosing which threats to control and what

resources to devote to protection.

22
Q

residual risk.

A

The risk that remains uncovered by controls

23
Q

impact

A

the amount of damage it can cause

24
Q

likelihood

A

threat is not just one that someone might want to pull off but rather one that could actually occur.

25
feasibility
Is it even possible to accomplish the attack?
26
method
the skills, knowledge, tools, and other things with which to perpetrate the attack.
27
script kiddie
describes someone who downloads a complete attack code package and needs only to enter a few details to identify the target and let the script perform the attack.
28
Opportunity
the time and access to execute an attack
29
motive
reason to want to attack.
30
“attractive targets,”
very appealing to attackers
31
attack surface
the system’s full set of vulnerabilities—actual and | potential.
32
control or countermeasure
a means to counter threats
33
Physical controls
stop or block an attack by using something tangible
34
Procedural or administrative controls
use a command or agreement that requires or advises people how to act
35
Technical controls
counter threats with technology (hardware or software),
36
overlapping controls or defense in depth:
more than one control or more than one class of control to achieve protection.