INFO310FINAL Flashcards
(144 cards)
Goal of Cybersecurity
Protection of Assets, Prevention Detection, and Recovery
CIA
confidentiality, Integrity, Availability.
Confidentiality (CIA)
the concealment of information or resources
Integrity (CIA)
the trustworthiness of data or resources
Availability (CIA)
Availability: the ability to use information or resources
Categories of Threats
Deception, Disruption, Disclosure, Usurpation
Deception (Category of threat)
The acceptance of false data
Disruption (Category of threat)
the interruption or prevention of correct operation
Disclosure (Category of threat)
The unauthorized access to information
Usurpation (Category of threat)
the unauthorized control of some part of a system
Snooping or eavesdropping (Type of threat)
the unauthorized interception of information, is a form of disclosure
Modification or alteration (Type of threat)
an unauthorized change of information is a form of usurpation, deception, and disclosure.
Masquerading or spoofing (Type of threat)
an impersonation of one entity by another, is a form of both deception and usurpation.
Repudiation of origin
a false denial that an entity sent (or created) something, is a form of deception.
Denial of receipt
a false denial that an entity received some information or mes- sage, is a form of deception
Delay
a temporary inhibition of a service, is a form of usurpation, al- though it can play a supporting role in deception.
Denial of service
a long-term inhibition of service, is a form of usurpation often also used as a mechanism of deception.
The Core of Cybersecurity
Asset, Threat, Vulnerability, Risk
Asset
People, property, and information of value
Threat
Anything that can exploit a vulnerability, intentionally or acciden- tally, and obtain, damage, or destroy an asset.
Vulnerability
Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Risk
The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
Formula for calculating risk
Asset + Threat + Vulnerability = Risk.
Polyalphabetic Ciphers
Any cipher based on substitution, using multiple substitution alphabets.