Computer Security Principles and Terminology Flashcards

1
Q

Computer Security definition

A

measures and controls that ensure confidentiality, integrity, and availability of information processed and stored by a computer, including software, hardware, firmware, information data, and telecommunications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Essential Network and Computer Security Requirements

A

Confidentiality
Integrity
Availability
Accountability
Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

The preservation of authorized restrictions on information access and disclosure (protecting personal privacy and proprietary information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

ensuring timely and reliable access to and use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Low Impact

A

limited adverse effect on the effected (organizations, individuals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Moderate Impact

A

Serious adverse effect on the effected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

High

A

Severe or catastrophic adverse effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adversary (threat agent)

A

Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack

A

Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Countermeasure

A

A device or technique that has as its objective the impairment of the operational effectiveness of undesirable or adversarial activity, or the prevention of espionage, sabotage, theft, or unauthorized access to or use of sensitive information or information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk

A

A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Policy

A

A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to maintain a condition of security for systems and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System Resource (Asset)

A

A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat

A

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through a information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability

A

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source

17
Q

Assets of a Computer System

A

Hardware
Software
Data
Communication facilities and networks

18
Q

Categories of vulnerabilities

A

Corrupted (loss of integrity)
Leaky (loss of confidentiality)
Unavailable or very slow (loss of availability)

19
Q

Threats

A

Capable of exploiting vulnerabilities
Represent potential security harm to an asset

20
Q

Attacks (threats carried out)

A

Active - attempt to alter system resources or affect their operation
Passive - attempt to learn or make use of system information that does not affect system resources
Insider - initiated by an entity inside the security parameter
Outsider - initiated from outside the perimeter

21
Q

Countermeasures

A

prevention, detection, recovery
may introduce new vulnerability, residual vulnerabilities may remain
goal is to minimize residual level of risk to the assets

22
Q

Unauthorized Disclosure

A

A circumstance or event whereby an entity gains unauthorized access to data

23
Q

Unauthorized Disclosure Threat Actions

A

Exposure: Sensitive data are directly released to an unauthorized
entity.
Interception: An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.
Inference: A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or by-products of communications.
Intrusion: An unauthorized entity gains access to sensitive data by circumventing a system’s security protections.

24
Q

Deception

A

A circumstance or event that may result in an authorized entity receiving false data and believing it to be true

25
Q

Deception Threat Action

A

Masquerade: An unauthorized entity gains access to a system or
performs a malicious act by posing as an authorized entity.
Falsification: False data deceive an authorized entity.
Repudiation: An entity deceives another by falsely denying
responsibility for an act.

26
Q

Disruption

A

A circumstance or event that interrupts or prevents the correct operation of system services and functions

27
Q

Disruption Threat Action

A

Incapacitation: Prevents or interrupts system operation by disabling
a system component.
Corruption: Undesirably alters system operation by adversely
modifying system functions or data.
Obstruction: A threat action that interrupts delivery of system
services by hindering system operation

28
Q

Usurpation

A

A circumstance or event that results in control of system services or functions by an unauthorized entity

29
Q

Usurpation

A

Misappropriation: An entity assumes unauthorized logical or
physical control of a system resource.
Misuse: Causes a system component to perform a function or
service that is detrimental to system security