Introduction Flashcards

1
Q

Computer security in essence…

A

deals with computer-related assets that are subject to a variety of threats and for which various measures are taken to protect those assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA triad + extra properties

A
  • Confidentiality
  • Integrity
  • Availability
    +
  • Authenticity
  • Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A
  • Private information is not available/disclosed to unauthorized users
  • Privacy: users control how information is used/shared with which 3rd parties

Loss:
Unauthorized disclosure of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A
  • Data: information and programs are changed only the expected way
  • System: prevent unauthorized manipulation of the system
    +
    Ensures non-repudiation and authenticity

Loss:
Unauthorized modification or destruction of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A
  • Service is not denied
  • Timely and reliable access

Loss:
Disruption of access or use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authenticity

A
  • User is who he says
  • Inputs came from trusted sources
  • Being genuine, verifiable and trustable

Loss:
Impersonation and modification of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accountability

A
  • Inputs can be traced uniquely to that entity
  • Supports non repudiation

Security breaches should be traced back to a responsible party.

Loss:
Impersonation and modification of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Impacts CIA (FIPS) - Low

A
  • Degradation in mission / the effectiveness of the company is greatly reduced
  • damage
  • financial loss
  • harm to individuals

Low: minor
Moderate: Significant
High: major, to individuals loss of life or serious-life threatening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Challenges of Security

A
  • Requirements can be complex and unknown
  • Security mechanisms might need users to be in possess and share secret information which complicates them
  • Security becomes a fight between perpetrator and designer/admin, where perpetrator needs to find only one weakness and designer/admin needs to cover all weaknesses.
  • It requires prior design and control, which only starts to be important after a security breach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between Data integrity and System Integrity

A

Data: information and programs are changed in the specified manner
System: system performs intended function free from unauthorized manipulation

Data focuses on information/programs content and System focuses in how it should work/function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly