Introduction Flashcards
(46 cards)
Define security
Minimizing the vulnerabilities of assets and resources
What are assets?
Anything of value, in information security these are information systems.
What is a vulnerability?
Any weakness that could be exploited to violate a system or the information is contains.
What is a threat?
A potential violation of security
What is the CIA triad?
Confidentiality
Integrity
Availability
What is confidentiality?
Preventing unauthorised disclosure of information
What is integrity?
Preventing unautherised (accidental or deliberate) modification or destruction of information
What is availability?
Ensuring resources are accessible when required by an authorised user
What is the OSI Security Architecture?
Systematic approach of providing security at each layer.
Defines security services and mechanisms that provide security for data transmitted over a network.
Defines threats (or attacks), services, mechanisms and how they are related
What are passive threats?
Threats that do not alter information in a system.
Eavesdropping, traffic analysis
hard to detect, focus on preventing their success
What is eavesdropping?
Attacker monitors communication.
E.g.: sniffing packets, tapping telephone
What is traffic analysis?
Attacker monitor the amount, source and destination of communication.
What are active threats?
Threats that alter information in the system.
These may be hard to prevent, focus on detection
What are some examples of active threats?
Masquerade
replay
modification of messages
Denial of service
What is the masquerade attack?
The attacker claims to be a different entity
What is the replay attack?
The attacker sends a message that has already been sent.
Retransmission of a passive capture of a data unit
What is the modification of messages attack?
Attacker changes messages during transmission
What is denial of service attack?
The attacker prevents legitimate users from accessing resources
What is a security service?
A processing or communication service to give a specific kind of protection to system resources (supports one or more of the security requirements: CIA, authenticity, accountability).
Implemented by security mechanisms.
What is a security mechanism?
Method of implementing one or more security services.
A process/device that is designed to detect, prevent or recover from attacks.
Name some security services (8)
Peer entity authentication
Data origin authentication
Access control
Data confidentiality
Traffic flow confidentiality
Data integrity
Non-repudiation
Availability services
What is Peer entity authentication?
Provides confirmation of the claimed identity of an entity.
Protects against masquerade or replay
What is Data origin authentication?
Provides confirmation of the claimed source (origin) of a data unit (message)
What is Access control?
Protection against unauthorized use of resources.
Usually provided in combination with authentication and authorisation services.