Lecture 1 Flashcards

(46 cards)

1
Q

What is Computer Security according to NISTIR 7298?

A

Measures and controls that ensure confidentiality integrity and availability of information processed and stored by a computer including hardware software firmware information data and telecommunications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Confidentiality?

A

Preserving authorized restrictions on information access and disclosure including means for protecting privacy and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Integrity?

A

Guarding against improper information modification or destruction including ensuring information nonrepudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability?

A

Ensuring timely and reliable access to and use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authenticity?

A

Ensuring trustworthiness and confidence in the source of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Accountability?

A

Allowing to trace actions to the actual originator supporting non-repudiation deterrence intrusion detection and prevention and legal action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Low Impact?

A

The loss could be expected to have a limited adverse effect on organizational operations organizational assets or individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Moderate Impact?

A

The loss could be expected to have a serious adverse effect on organizational operations organizational assets or individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is High Impact?

A

The loss could be expected to have a severe or catastrophic adverse effect on organizational operations organizational assets or individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a key challenge in Computer Security?

A

Attackers only need to find a single weakness while the designer must find and eliminate all weaknesses to achieve perfect security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a common perception problem in Computer Security?

A

There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a security failure occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of monitoring is required for security?

A

Security requires regular and constant monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an adversary threat agent?

A

Individual group organization or government that conducts or has the intent to conduct detrimental activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an attack?

A

Any kind of malicious activity that attempts to collect disrupt deny degrade or destroy information system resources or the information itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a countermeasure?

A

A device or technique that has as its objective the impairment of the operational effectiveness of undesirable or adversarial activity or the prevention of espionage sabotage theft or unauthorized access to or use of sensitive information or information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is risk?

A

A measure of the extent to which an entity is threatened by a potential circumstance or event and typically a function of 1 the adverse impacts that would arise if the circumstance or event occurs and 2 the likelihood of occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a security policy?

A

A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to maintain a condition of security for systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a system resource asset?

A

A major application general support system high impact program physical plant mission critical system personnel equipment or a logically related group of systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a threat?

A

Any circumstance or event with the potential to adversely impact organizational operations including mission functions image or reputation organizational assets individuals other organizations or the Nation through an information system via unauthorized access destruction disclosure modification of information andor denial of service.

20
Q

What is a vulnerability?

A

Weakness in an information system system security procedures internal controls or implementation that could be exploited or triggered by a threat source.

21
Q

What is hardware in computer systems?

A

Devices and equipment you use in your environment

22
Q

What is software in computer systems?

A

Code you run in any instance in your environment

23
Q

What is data in computer systems?

A

Any information that you collect process create log

24
Q

What are communication facilities and networks in computer systems?

A

The infrastructure that allows devices and users to cooperate in any digital form

25
What does corrupted mean?
loss of integrity
26
What does leaky mean?
loss of confidentiality
27
What does unavailable or very slow mean?
loss of availability
28
What are attacks?
threats carried out
29
What is an active attack?
attempt to alter system resources or affect their operation
30
What is a passive attack?
attempt to learn or make use of system information that does not affect system resources
31
What is an insider attack?
initiated from the inside
32
What is a Passive Attack?
Attempts to learn or make use of information from the system but it does not affect system resources. Eavesdropping on or monitoring of transmissions. Goal of attacker is to obtain information that is being transmitted. Two types: Release of message contents Traffic analysis.
33
What is an Active Attack?
Attempts to alter system resources or affect their operation. Involve some modification of the data stream or the creation of a false stream. Four categories: Replay Masquerade Modification of messages Denial of service.
34
What are Countermeasures?
Means used to deal with security attacks: Prevent Detect Recover. May itself introduce new vulnerabilities. Residual vulnerabilities may remain. Goal is to minimize residual level of risk to the assets.
35
What is NIST?
U.S. federal agency that deals with measurement science standards and technology related to U.S. government use and to the promotion of U.S. private sector innovation.
36
What is ISO?
A nongovernmental organization to achieve international agreements published as International Standards.
37
What is Access Control?
Limit information system access to authorized users and processes.
38
What is Awareness and Training?
Ensure that personnel are aware of security risks associated with their activities and of the applicable laws regulations and internal policies. Ensure that personnel are adequately trained.
39
What is Audit and Accountability?
Keep audit records to enable monitoring analysis investigation and reporting of unlawful.
40
What are some security requirements?
Uniquely traced accountability contingency planning identification and authentication incident response and maintenance.
41
What are the elements of contingency planning?
Establish maintain and implement plans for emergency response backup operations and post-disaster recovery to ensure availability of critical resources
42
What does incident response include?
Preparation detection analysis containment recovery and user-response activities. Also tracking documenting and reporting incidents to organization officials and/or authorities.
43
What does security requirements maintenance involve?
Performing periodic and timely maintenance on organization systems and providing effective controls on tools techniques mechanisms and personnel used for system maintenance
44
What are the three types of attack surfaces?
Network attack surface software attack surface and human attack surface.
45
What are the four aspects required for security policy implementation?
Prevention detection response and recovery.
46
What are the fundamental security design principles?
Economy of mechanism fail-safe defaults complete mediation open design separation of privilege least privilege least common mechanism psychological acceptability isolation encapsulation modularity layering and least astonishment.