CS Basic Security Concepts - Sheet1 Flashcards

(33 cards)

1
Q

What are the C.I.A Triad?

A

Three Security Objectives for info and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do each of the letters in C.I.A stand for?

A

Confidenetiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Confindentiality as an objective?

A

Only allowing authorised access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Integrity as an objective?

A

Only allowing authorised changes and deletion to info, and only authorised changes to system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Availability as an objective?

A

Offering access and use of info in a timely and reliable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 2 concepts related to Integrity?

A

Authenticity and Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is meant by Integrity-related Authenticity? In terms of information and users?

A

The property of being genuine, verifiable and trustable (info is from trusted source, users are who they say they are)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is meant by Integrity-related Accountability?

A

A goal, to ensure actions can be traced back to an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we implement Integrity-related Accountability?

A

Systems should keep record of all activities for future tracing if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 key assets in Computer Security?

A

Hardware, Software, Data, Communication facilities and network (e.g. routers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 types of asset vulnerabilities?

A

The system can become corrupted, leaky or unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens if a system is Corrupted?

A

The system does wrong things or gives wrong answers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens if a system is Leaky?

A

The system allows unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens if a system is Unavailable?

A

The system becomes unavailable or too slow to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an attack?

A

A threat that is carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 2 types of attack classification based on asset impact?

A

Active attack and Passive attack

17
Q

What is an Active attack?

A

An attempt to change assets or affect their operation

Attacker attempts to alter, damage, disrupt, or manipulate system assets

It directly affects the integrity, availability, or operation of data or systems.

18
Q

What is a Passive attack?

A

An attempt to learn or make use of information from system.
Does not affect assets

Compromises confidentiality but leaves the system’s operations untouched

A passive attack involves surveillance or data gathering without changing anything in the system.

19
Q

What are the 2 types of attack classification based on attack origin?

A

Inside attack and Outside attack

20
Q

What is an Inside attack?

A

An attack carried out by an authorised used of the system

Inside attacker = Insider

21
Q

What is an Outside attack?

A

An attack carried out by an unauthorised used of the system

22
Q

What is Risk?

A

A measure of the extent an asset is threatened by a potential event

Risk=f(Impact,Likelihood)

23
Q

What 2 things are used to usually calculate the level of Risk?

A

The negative effects of the event, and the likilhood of it happening

24
Q

What is a Countermeasure?

A

Any actions taken to deal with a threat or attack

25
What are the 4 Countermeasures?
Detection, Prevention, Mitigation, Recovery
26
What is Encryption?
Transforming info using a secret key
27
What is Access Control?
Rules to limit people/system access to resources. Rules are based on Identity and Role of a person.
28
What is Authorisation?
Checking if a person/system is allowed access, based on Access Control policies
29
What is Authentication?
Checking someone's identity or role
30
What is Physical Security?
Establishing physical barriers to resources
31
What are Backups?
Occasional archiving of data
32
What are Checksums?
A unique value calculated from the contents of a file
33
What are Computational Redundancies?
Computers and Storage Devices that serve as backups in case of failure